Data protection essay

Document Type:Essay

Subject Area:Computer Science

Document 1

Data protection can also be achieved in organizations if they can build security systems that limit the permissions of those who can access information stored on computer systems. Discussion Disk encryption could also be used as a mechanism to safeguard data. Through encrypting data on a hard disk drive, it is possible for information to be protected from outsiders. Disk encryption can be done through the use of encryption hardware which preserves the physical platform where data is stored. Software could also be installed to protect the hard drive by encrypting confidential files (Zhang 44). The use of biometric technology could also be used to necessitate authentication to prevent malicious users from logging into their computer systems and changing their privilege levels.

Sign up to view the full document!

Granted, the use of biometric technology and ensures that peripheral devices are protected and that hard disks are safeguarded from malicious attackers. Legal access can be prevented by hardware access control. Hardware protection has been adopted by most organizations as they have capitalized on the abilities of external users and hackers to manipulate existing systems (Mantelero 252). However, organizations that deal with consumer data prefer to combine a secure system of administration and a hardware security system to ensure that malicious users are not able to access the system mainly if it contains a backdoor. Share level permissions are issued together with file level permissions to protect information users (Zhang 74). Through the use of security tabs, information technology officers can provide permissions to data users (Manhart and Stefan 195).

Sign up to view the full document!

Permissions can also be used as a security measure to prevent multiple level access to information. Granted, securing wireless transmission is regarded as one of the most critical elements of protecting data within an organization. Most companies transmit large amounts of data over wireless networks leaving information exposed to interception than the information that is transmitted through Ethernet networks (Zhang 56). In the event that an organization determines that the information that they are using is obsolete, it is essential for them to erase the data from their systems. Through the use of a software data information is erased by overwriting and destroying electronic data in the hard drive (Zhang 25). Erasure is a security measure to safeguard sensitive data and to ensure that no data is lost when computer systems are replaced.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable