Tuesday 15 January 2013

Evaluation Of Different Aspects Of The Data Protection

By Douglas Rathbone


Computer systems specialize in the collection and analysis of raw figures. These raw facts are then processed into valuable information during the processing. Information is stored once the facts have been carefully analyzed. The storage of information depends on the storage strategies adopted by the organizations. Information is held to facilitate the decision making at various stages. Data protection measures are adopted to safeguard the valuable information.

There are various reasons for protecting information. In some organizations, information forms a very critical part of the structures. The development of such organizations solely depends on the available information. There is a need to protect the growth of such entities. Information is protected so that the original version of it is not tampered. Messing with such critical information would mean that the importance is lost.

Measures used for protection of data depend on the organization and its needs. Some adopt very basic measures since the operations are basic. Other employ the secondary and tertiary measures since the data operations are very complex. In some cases, software measures compliment the physical measures adopted. All these measures can be integrated to form one large system of safeguarding all the information.

Passwords are special combinations of characters and symbols which are used to lock the system holding information. One has to enter the right sequence of such characters before they can access the information. Only the persons with the right sequence can unlock the systems. Sequential passwords boost the safeguarding of information. Hierarchical passwords are incorporated to boost the security further.

Audit trials are software tools that maintains a log of all the processing activities taking place within information and related systems. The log keeps a register of all the activities performed by different users who access the systems. Any unauthorized access is pointed out by the system. The software tracking tools are integrated to perform all the tracking within such systems.

Physical measures can also be used in some cases. The data is locked up in very special safes. These safes are then locked up in secured locations. Access to such safes is restricted to authorized persons. Cameras are installed to boost the surveillance of such locations.

There are various groups of stakeholders within organizations. Duties are segregated to these classes of people such everybody has a role to play in securing the systems. The data protection is done from a holistic approach. This approach boosts the general security of information since everybody has a role to play.




About the Author:



No comments:

Post a Comment