Chapter 3 - Security and relevance of data and Information
Chapter 3 - Security and relevance of data and Information
RELEVANCE OF DATA
AND INFORMATION
DATA SECURITY
IS THE SAFEGUARDING DIGITAL
INFORMATION THROUGHOUT IT'S
ENTIRE LIFE CYCLE TO PROTECT IT FROM
CORRUPTION,THEFT,OR UNAUTHORIZED
ACCESS. IT COVERS EVERYTHING
HARDWARE , SOFTWARE , STORAGE
DEVICES AND USERS DEVICES, ACCESS
AND ADMINISTRATIVE CONTROLS AND
ORGANIZATION POLICIES AND
PROCEDURES.
TYPES OF DATA SECURITY
1. ENCRYPTION
Data encryption is the use of algorithms to scramble data
and hide its true meaning. Encrypting data ensures
messages can only be read by recipients with the
appropriate decryption key. This is crucial, especially in the
event of a data breach, because even if an attacker manages
to gain access to the data, they will not be able to read it
without the decryption key.
2. Data Erasure
6. Employee Training:
Educating staff on security best practices and the
importance of protecting sensitive information.
7. Monitoring and Logging:
Keeping track of activities
within the system to detect and
respond to any suspicious
behavio or breaches promptly.
Data and Information Security
Policy
1. User Authentication:
Specify requirements for user authentication
methods, such as passwords, multi-factor
authentication (MFA), or biometric authentication, to
verify the identity of users accessing the MIS.
1. Protection of Confidentiality:
Ensuring that sensitive data is only accessible to authorized
individuals or entities prevents unauthorized disclosure or
exposure, safeguarding sensitive information such as personal,
financial, or proprietary data.
2. Preservation of Integrity:
Maintaining the accuracy and reliability of data is crucial for
making informed decisions and conducting business operations
effectively. Protecting data from unauthorized tampering,
alteration, or corruption helps preserve its integrity and
trustworthiness.
3. Availability and Accessibility:
Ensuring that data and information are available and accessible
when needed enables uninterrupted business operations, decision-
making processes, and service delivery. Protecting against
disruptions, downtime, or denial-of-service attacks helps maintain
continuity and productivity.