The protection of files or folder is called Data Security. Data stored in any computer can be lost due to different reasons. It can be lost accidentally or someone can damage. It can be lost completely or partially. Some files are much valuable and important than hardware or computer itself. It should be saved in such way that it may not be lost or damaged.
Data Security is very important to run a successful organization. It is very important to protect it from illegal and unauthorized access. Some organizations obtain information from users and store online for to provide fast services. Some examples are as follows:
- A credit card company may store information of its customers online.
- Banks may provide online services to their clients.
- The educational institute provides facility online results.
A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. It can be damage in two ways:
1. Intentional Threats
An angry employee of organization can delete important files or a hacker can damage information on a computer.
2. Unintentional Threats
An authorized user may delete or change the sensitive files accidentally. It may damage by a failure of a hardware component or suddenly failure of power.
Secure Data From Threats
Data can be protected by different methods. Some important methods reduce security threats which are given below:
1. User Right:
The user must be assigned proper rights to minimize security threats. Every authorized user should not be allowed to change or remove data.
2. Periodic Backup
Periodic Backup of files should be taken regularly. The backup can be used to meet the situation if some occur.
3. Passwords Protection
The best and possible solution of these problems is the use of a proper password. Passwords must be required to access any data. Passwords should change periodically. Very small and common words should not use because anyone guesses easily.
Encryption is a process of encoding data and an authorized user may understand or use it. To read an encrypted file, he/she must have access to a secret key or password that enables you to decrypt it. If an unauthorized person gets access to the data, he should not able to understand it.
The data must be scan before use and proper virus scanning software should be used to scan it. Software should be upgraded to detect and remove latest viruses.
Computer and all backing storage devices should be placed in locked safe room. Only trusted users should be allowed to access these resources.