SlideShare a Scribd company logo
1 of 12
DATA SECURITY

Data security is about keeping data safe. Many
individuals, small businesses and major
companies rely heavily on their computer
systems
KEY THREATS TO DATA
           SECURITY
Data may get:
   -lost or damaged during a system crash - especially one affecting the hard disk

   corrupted as a result of faulty disks, disk drives, or power failures

   -lost by accidentally deleting or overwriting files

   -lost or become corrupted by computer viruses

   -hacked into by unauthorized users and deleted or altered

   -destroyed by natural disasters, acts of terrorism, or war

   -deleted or altered by employees wishing to make money or take revenge on their employer
KEEPING DATA SECURE
Measures that can be taken to keep data
secure include:
 -making regular backups of files (backup copies should be stored in
 fireproof safes or in another building)

 -protecting yourself against viruses by running anti-virus software

 -using a system of passwords so that access to data is restricted

 -safe storage of important files stored on removable disks, eg locked
 away in a fireproof and waterproof safe
-allowing only authorised staff into certain computer
areas, eg by controlling entry to these areas by means of
ID cards or magnetic swipe cards
-always logging off or turning terminals off and if possible
locking them
-avoiding accidental deletion of files by write-protecting
disks
-using data encryption techniques to code data so that
itmakes no apparent sense
Data Transfer
Transfer of data files containing pictures
(graphics), text, sound, or numbers is possible
from one computer to another, one make of
hardware to another, and one application to
another. This is possible because standard file
types and data formats have been developed.
Data does not need to be transfered on physical
media, it can be transmitted at rapid speeds
around the globe.
DATA FILE TYPES
Data files are stored in a number of formats, the formats depend on which
application created the file to begin with.

For example, Microsoft Word stores files as *.doc but Adobe Photoshop stores
files in a different format - *.psd.

The file extension identifies the file's format.

When data is transferred from one computer to another, the computer
receiving the data file may not be able to read the format without the right
application installed.

For example, an image created in Adobe Photoshop and saved as a *.psd file
(Photoshop's format) would not be readable by Microsoft Paint.
TRANSLATING BETWEEN
      FILE TYPES
   Data can be stored temporarily in a computer's RAM as a means of transfer
   from one application to another. In Microsoft operating systems this feature is
   called the clipboard and it can copy data from one application and paste it into
   another. Nearly all other operating systems support this functionality.

   For example you can create a graph using a spreadsheet application and then
   use the clipboard to copy the graph to a desktop publishing application.

Limitations:

   -Certain elements of one document may not be copiable to another
   application, eg video.

   -Some file features (eg text layout and formatting) may be lost in the
   translation to a different format.
RAPID TRANSFER OF
         DATA
Files can be easily transferred and shared across the
globe using the Internet. A file could be:

emailed as an attachment

sent over instant messenger

downloaded from a website/web server

accessed over a private network
IMPORT AND EXPORT
1.Export saves the file in a format that's readable by other applications.

2.Import opens a file created in another application for viewing or
editing.

   The need to import and export data files has led to the development
   of several standard file types that many applications can
   understand.

   Examples are jpg and gif files for images, and mp3 files for sound;
   but there are also standard file types for text, movies, and
   spreadsheet data.

   Often an application of a different type can import data, for
   example, a word processor may be able to import a spreadsheet file.
XML FILES
Recently program developers have started to use the
XML web page file format as the standard way to store
data. Files can be read by any browser on any
computer, making it very easy to transfer data between
computers.
Other standard file types, such as zip and pdf (portable
document format), have been developed as ways of
distributing data in the most efficient way possible. They
do this by compressing it using zip technology or making it
possible to read using a freely available downloaded
reader application, as is the case with PDF files.
Bibliography
http://www.bbc.co.uk/schools/gcsebitesize/ict/da
tabases/6datasecurityrev1.shtml

http://www.bbc.co.uk/schools/gcsebitesize/ict/da
tabases/datatransferrev1.shtml

More Related Content

What's hot

Management information systems
Management information systemsManagement information systems
Management information systemsaz00z
 
Introduction to-microcomputers
Introduction to-microcomputersIntroduction to-microcomputers
Introduction to-microcomputersraynaldogisiri
 
L7 operating system
L7   operating systemL7   operating system
L7 operating systemheidirobison
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT InfrastructureLopamudra Das
 
PC techniques software and Hardware
PC techniques software and HardwarePC techniques software and Hardware
PC techniques software and HardwareMUSAAB HASAN
 
Implementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.SivakumarImplementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.SivakumarSivakumar R D .
 
Computers and more
Computers and moreComputers and more
Computers and moreEli Jimenez
 
Database Management System users
Database Management System usersDatabase Management System users
Database Management System usersRaj vardhan
 
could computing back story
could computing back storycould computing back story
could computing back storyansar ahmed
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1Raj vardhan
 
Information technology
Information technologyInformation technology
Information technologyBadar Rizwan
 
Teaching systems and fundamentals
Teaching systems and fundamentalsTeaching systems and fundamentals
Teaching systems and fundamentalsHouston ISD
 

What's hot (19)

Management information systems
Management information systemsManagement information systems
Management information systems
 
Files Management
Files ManagementFiles Management
Files Management
 
Introduction to-microcomputers
Introduction to-microcomputersIntroduction to-microcomputers
Introduction to-microcomputers
 
Storage devices
Storage devicesStorage devices
Storage devices
 
B.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMS
B.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMSB.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMS
B.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMS
 
L7 operating system
L7   operating systemL7   operating system
L7 operating system
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Database History
Database HistoryDatabase History
Database History
 
Microprocressers
Microprocressers Microprocressers
Microprocressers
 
PC techniques software and Hardware
PC techniques software and HardwarePC techniques software and Hardware
PC techniques software and Hardware
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
 
Implementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.SivakumarImplementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.Sivakumar
 
Computers and more
Computers and moreComputers and more
Computers and more
 
Database Management System users
Database Management System usersDatabase Management System users
Database Management System users
 
could computing back story
could computing back storycould computing back story
could computing back story
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
Information technology
Information technologyInformation technology
Information technology
 
Teaching systems and fundamentals
Teaching systems and fundamentalsTeaching systems and fundamentals
Teaching systems and fundamentals
 
Database & Database Users
Database & Database UsersDatabase & Database Users
Database & Database Users
 

Viewers also liked

Ефективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіЕфективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіJmenka Kravchenko
 
Caribstudiesmodule1notes
Caribstudiesmodule1notes Caribstudiesmodule1notes
Caribstudiesmodule1notes Carlton Corke
 
Ttristany an isolda!
Ttristany an isolda!Ttristany an isolda!
Ttristany an isolda!carlaserrat
 
Ttristany an isolda!
Ttristany an isolda!Ttristany an isolda!
Ttristany an isolda!carlaserrat
 
Perspectives on Innovation and Technology Transfer
Perspectives on Innovation and Technology TransferPerspectives on Innovation and Technology Transfer
Perspectives on Innovation and Technology TransferMikus Dubickis
 
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition R2 ...
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition  R2 ...First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition  R2 ...
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition R2 ...dhineser
 
Kkm kls x ok semester 1
Kkm kls x ok semester 1Kkm kls x ok semester 1
Kkm kls x ok semester 1liza1207
 
Ефективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіЕфективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіJmenka Kravchenko
 
lembar soal obyektif
lembar soal obyektiflembar soal obyektif
lembar soal obyektifliza1207
 
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...Barbara Cunningham, Psy.D., MFT
 
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.com
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.comBowen Family Systems: Model of Practice at www.Cunninghamtherapy.com
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.comBarbara Cunningham, Psy.D., MFT
 

Viewers also liked (17)

Data security
Data securityData security
Data security
 
Ефективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіЕфективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТі
 
LicenseFs 4
LicenseFs 4LicenseFs 4
LicenseFs 4
 
Caribstudiesmodule1notes
Caribstudiesmodule1notes Caribstudiesmodule1notes
Caribstudiesmodule1notes
 
Ttristany an isolda!
Ttristany an isolda!Ttristany an isolda!
Ttristany an isolda!
 
Ttristany an isolda!
Ttristany an isolda!Ttristany an isolda!
Ttristany an isolda!
 
Perspectives on Innovation and Technology Transfer
Perspectives on Innovation and Technology TransferPerspectives on Innovation and Technology Transfer
Perspectives on Innovation and Technology Transfer
 
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition R2 ...
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition  R2 ...First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition  R2 ...
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition R2 ...
 
Kkm kls x ok semester 1
Kkm kls x ok semester 1Kkm kls x ok semester 1
Kkm kls x ok semester 1
 
Hovorukhina
HovorukhinaHovorukhina
Hovorukhina
 
Prогон
PrогонPrогон
Prогон
 
Ефективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіЕфективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТі
 
Fentanyl& california's physician diversion program
Fentanyl& california's physician diversion programFentanyl& california's physician diversion program
Fentanyl& california's physician diversion program
 
Fentanyl and california's physician diversion program
Fentanyl and california's physician diversion programFentanyl and california's physician diversion program
Fentanyl and california's physician diversion program
 
lembar soal obyektif
lembar soal obyektiflembar soal obyektif
lembar soal obyektif
 
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...
 
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.com
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.comBowen Family Systems: Model of Practice at www.Cunninghamtherapy.com
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.com
 

Similar to Data security and Data Transfer

Storage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationStorage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationHybrid Cloud
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesRevolucion
 
Input ,Output & Storage Devices
Input ,Output & Storage DevicesInput ,Output & Storage Devices
Input ,Output & Storage DevicesAshirwadPandey1
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefHybrid Cloud
 
File extensions
File extensionsFile extensions
File extensionsJLPolking
 
Meyer poster draft
Meyer poster draftMeyer poster draft
Meyer poster draftScott
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its applicationABUL HASAN
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptxvuqaxuly
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptxvuqaxuly
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information SystemsThomas Mon
 
System software 1
System software 1System software 1
System software 1fatinsmile
 

Similar to Data security and Data Transfer (20)

DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Storage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationStorage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer Acceleration
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
 
MSCIT Unit 1
MSCIT Unit 1MSCIT Unit 1
MSCIT Unit 1
 
Downloading Steps
Downloading StepsDownloading Steps
Downloading Steps
 
Input ,Output & Storage Devices
Input ,Output & Storage DevicesInput ,Output & Storage Devices
Input ,Output & Storage Devices
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution Brief
 
File management.pptx
File management.pptxFile management.pptx
File management.pptx
 
File extensions
File extensionsFile extensions
File extensions
 
Meyer poster draft
Meyer poster draftMeyer poster draft
Meyer poster draft
 
RAM_Application.pdf
RAM_Application.pdfRAM_Application.pdf
RAM_Application.pdf
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its application
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptx
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptx
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Computer application
Computer applicationComputer application
Computer application
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information Systems
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Cloud docu ppt
 
System software 1
System software 1System software 1
System software 1
 

Recently uploaded

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Data security and Data Transfer

  • 1.
  • 2. DATA SECURITY Data security is about keeping data safe. Many individuals, small businesses and major companies rely heavily on their computer systems
  • 3. KEY THREATS TO DATA SECURITY Data may get: -lost or damaged during a system crash - especially one affecting the hard disk corrupted as a result of faulty disks, disk drives, or power failures -lost by accidentally deleting or overwriting files -lost or become corrupted by computer viruses -hacked into by unauthorized users and deleted or altered -destroyed by natural disasters, acts of terrorism, or war -deleted or altered by employees wishing to make money or take revenge on their employer
  • 4. KEEPING DATA SECURE Measures that can be taken to keep data secure include: -making regular backups of files (backup copies should be stored in fireproof safes or in another building) -protecting yourself against viruses by running anti-virus software -using a system of passwords so that access to data is restricted -safe storage of important files stored on removable disks, eg locked away in a fireproof and waterproof safe
  • 5. -allowing only authorised staff into certain computer areas, eg by controlling entry to these areas by means of ID cards or magnetic swipe cards -always logging off or turning terminals off and if possible locking them -avoiding accidental deletion of files by write-protecting disks -using data encryption techniques to code data so that itmakes no apparent sense
  • 6. Data Transfer Transfer of data files containing pictures (graphics), text, sound, or numbers is possible from one computer to another, one make of hardware to another, and one application to another. This is possible because standard file types and data formats have been developed. Data does not need to be transfered on physical media, it can be transmitted at rapid speeds around the globe.
  • 7. DATA FILE TYPES Data files are stored in a number of formats, the formats depend on which application created the file to begin with. For example, Microsoft Word stores files as *.doc but Adobe Photoshop stores files in a different format - *.psd. The file extension identifies the file's format. When data is transferred from one computer to another, the computer receiving the data file may not be able to read the format without the right application installed. For example, an image created in Adobe Photoshop and saved as a *.psd file (Photoshop's format) would not be readable by Microsoft Paint.
  • 8. TRANSLATING BETWEEN FILE TYPES Data can be stored temporarily in a computer's RAM as a means of transfer from one application to another. In Microsoft operating systems this feature is called the clipboard and it can copy data from one application and paste it into another. Nearly all other operating systems support this functionality. For example you can create a graph using a spreadsheet application and then use the clipboard to copy the graph to a desktop publishing application. Limitations: -Certain elements of one document may not be copiable to another application, eg video. -Some file features (eg text layout and formatting) may be lost in the translation to a different format.
  • 9. RAPID TRANSFER OF DATA Files can be easily transferred and shared across the globe using the Internet. A file could be: emailed as an attachment sent over instant messenger downloaded from a website/web server accessed over a private network
  • 10. IMPORT AND EXPORT 1.Export saves the file in a format that's readable by other applications. 2.Import opens a file created in another application for viewing or editing. The need to import and export data files has led to the development of several standard file types that many applications can understand. Examples are jpg and gif files for images, and mp3 files for sound; but there are also standard file types for text, movies, and spreadsheet data. Often an application of a different type can import data, for example, a word processor may be able to import a spreadsheet file.
  • 11. XML FILES Recently program developers have started to use the XML web page file format as the standard way to store data. Files can be read by any browser on any computer, making it very easy to transfer data between computers. Other standard file types, such as zip and pdf (portable document format), have been developed as ways of distributing data in the most efficient way possible. They do this by compressing it using zip technology or making it possible to read using a freely available downloaded reader application, as is the case with PDF files.