1. Course Content: Describe the most important aspects of this course for you wi
ID: 3848773 • Letter: 1
Question
1. Course Content: Describe the most important aspects of this course for you with respect to the content that was covered or activities in which you participated. Discuss the relevance and value or the practicum assignment with respect to your knowledge acquisition.
2. Application of Course Content: Describe how you applied what you learned in this course at your workplace. Discuss how this course may have impacted your specific job, techniques you used at work, or other relevant aspects that show how what you learned was linked to your job.
3. Job Experience Integration: Describe how your work experiences were used in the classroom and attributed to your performance in the course. Discuss how integrating your work experiences in class activities assisted in understanding topics discussed within the course.
SUBJECT : DATA AND SYSTEM SECURITY..........ELLOBARATE THE ANSWERS
Explanation / Answer
Data and system security clubed together is a very important subject in which the two concepts(data security and system security) are interdependent on one another to make the overall protection of the system more resistant towards destructive forces and unauthorized accesses. The most important aspects of this course are to learn how to protect data by software and hardware methods and to learn how to protect the overall system itself. To start with the data security the following are the important aspects:-
1.Data encryption- This deals with the protection of data which may be files, videos, audios, documents etc using disk encryption. This type of encryption can be software encryption or hardware encryption which resides in the hard disk of the system and is a base level protection for the data.
3.Access restriction- The access to the most valuable data should be given accordingly.A good amount of attackings can be stoped when right restrictions are imposed on the important data( like read only, write only etc)
2.Data backup- The backup of the important data is a good practice saving valuable information from being erased, manipulated or changed which effects the user. The backing up of data ensures that even the destructed data can be retrieved from other sources. In todays world all the small and big sectors are backing up their data to save themselves from going into loss if in case they loose all their previous and present data's.
3.Data masking- Data masking is widely used in todays day to day world scenarios where the crucial data is being obsecured in the databases and other data storing devices inorder to restrict the usage of this data by unauthorized personals.Masking of the data makes it difficult for the attacker to see the actual data hiden behind the masked one.
4Software and hardware solutions- Encryption of data from other softwares can provide protection to certain level and makes it difficult for the attacker to decrypt the data. Harware encrpytion such as biometrics, punch cards, tokens can add an extra level of security which will make it way more difficult for the hacker to access the data, since it requires physical ways to access the data.
Coming to the system security the following are the important aspects
1. Password protection- Creating a strong alphanumerical string as password is amandatory in todays world. A strong password can really make it difficult for unauthorized users to get pass through the security. A strong password is composed of both upper and lower case letters, special characters, symbols and numbers.
2. Use antivirus and anti spam programs to keep the system from getting attacked by hackers, spam content, viruses and illegal accessings.
3.Special software features- Cryptography, intrusion detection system, firewalls, audit trails are always available to detect the network based attacks and can give you precautions and prevention steps.
4.Software updates- Always update the virus definitions, antivirus and system software as the new updates are more advanced and can prevent the attack from new virus or network attacks.
5.Administration and authorization- Its is important to monitor the activities performed in the system and the background processses being run inorder to be up to date with the checkup of the system protection. One should not provide authorization to the unknown users or other unidentified users and always restrict their reach to the secure information.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.