Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Data security

From Wikipedia, the free encyclopedia
Process of securing digital information
Not to be confused withData privacy.

Data security ordata protection is the process of securing digital information to protect it from online threats. Data security or protection means protectingdigital data, such as those in adatabase, from destructive forces and from the unwanted actions of unauthorized users,[1] such as acyberattack or adata breach.[2] Data security protectscomputer hardware,software, storage devices, and the data of user devices. Data security also protects the data of organizations, companies and administrative controls.

Data security guarantees the protection of individual data, such asidentity documents and bank data, and protects against unauthorized access, theft and loss of individual data. Data security also protectsdata breaches that occurs in companies and industries. Good security measures in industries reduce the probability of data breaches, and employees can rely on the company with their data and private information to be kept secured while companies can continue to maintain a stable reputation.[3]

Technologies

[edit]

Disk encryption

[edit]
Main article:Disk encryption

Disk encryption refers toencryption technology that encrypts data on ahard disk drive. It takes data from astorage device and coverts it into an unreadable format. Disk encryption typically takes form in eithersoftware (seedisk encryption software) orhardware (seedisk encryption hardware) which can be used together. Disk encryption is often referred to ason-the-fly encryption (OTFE) or transparent encryption.Full disk encryption encrypts each individual sector of a disk volume. Files and user data are encrypted to hinder unauthorized users from accessing without adecryption key. A diversifier permits a plaintext of a specific disk sector to be encrypted into different ciphertexts, which does not require additional storage, such as aninitialization vector (IV) ormessage authentication code (MAC).[4]

Software versus hardware-based mechanisms for protecting data

[edit]

Software-based security solutions encrypt the data to protect it from theft. However, amalicious program or ahacker couldcorrupt the data to make it unrecoverable, making the system unusable. Hardware-based security solutions prevent read and write access to data, which provides very strong protection against tampering and unauthorized access.

Hardware-based security or assistedcomputer security offers an alternative to software-only computer security.Security tokens such as those usingPKCS#11 or a mobile phone may be more secure due to the physical access required in order to be compromised.[5] Access is enabled only when the token is connected and the correctPIN is entered (seetwo-factor authentication). However,dongles can be used by anyone who can gain physical access to it. Newer technologies in hardware-based security solve this problem by offering full proof of security for data.[6]

Working off hardware-based security: A hardware device allows a user to log in, log out and set different levels through manual actions. Many devices usebiometric technology to prevent malicious users from logging in, logging out, and changing privilege levels. The current state of a user of the device is read by controllers inperipheral devices such as hard disks. Illegal access by a malicious user or a malicious program is interrupted based on the current state of a user by hard disk and DVD controllers making illegal access to data impossible. Hardware-based access control is more secure than the protection provided by the operating systems as operating systems are vulnerable to malicious attacks byviruses and hackers. The data on hard disks can be corrupted after malicious access is obtained. With hardware-based protection, the software cannot manipulate the user privilege levels. Ahacker or a malicious program cannot gain access to secure data protected by hardware or perform unauthorized privileged operations. This assumption is broken only if the hardware itself is malicious or contains a backdoor.[7] The hardware protects the operating system image and file system privileges from being tampered with. Therefore, a completely secure system can be created using a combination of hardware-based security and secure system administration policies.

Backups

[edit]
Main article:Backup

Backup is the process of reproducing copies of essential data and storing in a separate, secured place. It is used to ensure data that is lost can be recovered from another source. Backups contains a minimum of one copy of the data that requires preservation.[8] It is considered essential to keep a backup of any data in most industries and the process is recommended for any files of importance to a user.[9]

There are 3 types of backups; full backups, incremental backups, and differential backups. Full backups secure all data from a production system, such as a server, database, or other connected data source. It is impossible to lose all data in a full backup if a breach or corruption were to occur. Full backups require a significantly large amount of time to back up and may be time-consuming taking hours to days to complete.[10]Incremental backups only secures changed data since last backup. While all backups are done in full backups, incremental backups only save data that is recently or frequently changed. Incremental backups require lower storage costs making it a prominent solution for growing datasets.[11]

Data Privacy

[edit]
Main article:Data privacy

Data privacy (orinformation privacy) is the right for individual's data to be secured to obstruct the use of unauthorized access. It gives individuals control over their data and how it can be shared to thrid parties. The U.S Privacy Protection Law (seePrivacy laws of the United States) requires organizations to inform individuals of how their data is collected and when a data breach occurs.[12] By implementing an encryption, it ensures that private data is unreadable tocybercriminals.[13]

Data masking

[edit]
Main article:Data masking

Data masking of structured data is the process of obscuring (masking) specific data within a database table or cell to ensure that data security is maintained and sensitive information is not exposed to unauthorized personnel.[14] This may include masking the data from users (for example so banking customer representatives can only see the last four digits of a customer's national identity number), developers (who need real production data to test new software releases but should not be able to see sensitive financial data),outsourcing vendors, etc.[15] Data masking is a form of encryption, as it obscures data by modifying particular letters and numbers to keep data concealed and protected from potential hackers. The individual that has access to the code that decrypts the replaced characters are the only ones that can uncover the data.[16]

Data erasure

[edit]
Main article:Data erasure

Data erasure (or data deletion, data destruction) is a method of software-based overwriting that permanently clears all electronic data residing on a hard drive or other digital media to ensure that no sensitive data is lost when an asset is retired or reused.[17]Article 17: Right to be Forgotten states that users have the right to permanently remove all of their private information from their old devices/services to give people more control over their data. Users are able to switch between devices efficiently.[18]

International laws and standards

[edit]

International laws

[edit]

In theUK, theData Protection Act is used to ensure that personal data is accessible to those whom it concerns, and provides redress to individuals if there are inaccuracies.[19] This is particularly important to ensure individuals are treated fairly, for example for credit checking purposes. The Data Protection Act states that only individuals and companies with legitimate and lawful reasons can process personal information and cannot be shared.Data Privacy Day is an internationalholiday started by theCouncil of Europe that occurs every January 28.[20]

Since theGeneral Data Protection Regulation (GDPR) of theEuropean Union (EU) became law on May 25, 2018, organizations may face significant penalties of up to €20 million or 4% of their annual revenue if they do not comply with the regulation.[21] It is intended that GDPR will force organizations to understand theirdata privacy risks and take the appropriate measures to reduce the risk of unauthorized disclosure of consumers’ private information.[22]

International standards

[edit]

The international standardsISO/IEC 27001:2013 andISO/IEC 27002:2013 cover data security under the topic ofinformation security, and one of its cardinal principles is that all stored information, i.e. data, should be owned so that it is clear whose responsibility it is to protect and control access to that data.[23][24] The following are examples of organizations that help strengthen and standardize computing security:

TheTrusted Computing Group is an organization that helps standardize computing security technologies.

ThePayment Card Industry Data Security Standard (PCI DSS) is a proprietary international information security standard for organizations that handle cardholder information for the majordebit,credit, prepaid,e-purse,automated teller machines, and point of sale cards.[25]

TheGeneral Data Protection Regulation (GDPR) proposed by the European Commission will strengthen and unify data protection for individuals within the EU, whilst addressing the export of personal data outside the EU.

Safeguards

[edit]

The four types of technical safeguards areaccess controls,flow controls, inference controls, anddata encryption. Access controls manage user entry and data manipulation, while flow controls regulate data dissemination. Inference controls prevent deduction of confidential information from statistical databases and data encryption prevents unauthorized access to confidential information.[26]Health Insurance Portability and Accountability Act (HIPPA) is a law that requires entities such as healthcare providers to keep patient confidentiality for three reuired safeguards: administrative, physical, and technical.[27]

See also

[edit]

References

[edit]
  1. ^Summers, G. (2004). Data and databases. In: Koehne, H Developing Databases with Access: Nelson Australia Pty Limited. p4-5.
  2. ^"Knowing Your Data to Protect Your Data".IT Business Edge. 2017-09-25. Retrieved2022-11-03.
  3. ^"Data Security: Definition, Importance, and Types".Fortinet. Retrieved2025-10-26.
  4. ^Rupp, Eduard; Syrmoudis, Emmanuel; Grossklags, Jens (2022)."Leave No Data Behind – Empirical Insights into Data Erasure from Online Services".Proceedings on Privacy Enhancing Technologies.ISSN 2299-0984.
  5. ^Thanh, Do van; Jorstad, Ivar; Jonvik, Tore; Thuan, Do van (2009). "Strong authentication with mobile phone as security token".2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems. pp. 777–782.doi:10.1109/MOBHOC.2009.5336918.ISBN 978-1-4244-5114-2.S2CID 5470548.
  6. ^Stubbs, Rob (Sep 10, 2019)."Why the World is Moving to Hardware-Based Security". Fortanix. Retrieved30 September 2022.
  7. ^Waksman, Adam; Sethumadhavan, Simha (2011),"Silencing Hardware Backdoors"(PDF),Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California,archived(PDF) from the original on 2013-09-28
  8. ^"What is Backup and Recovery? | Learn Data Backup Solutions".Cohesity. Retrieved2025-10-26.
  9. ^"Back-ups | Stay Smart Online". Archived fromthe original on 2017-07-07.
  10. ^"What is Backup and Recovery? | Learn Data Backup Solutions".Cohesity. Retrieved2025-10-26.
  11. ^Jackson, Kevin (2024-04-08)."Incremental vs. Differential Backup: Balancing Speed and Storage".Trilio. Retrieved2025-10-26.
  12. ^"What Is Data Privacy? Definition & Protection | Proofpoint US".Proofpoint. 2021-06-29. Retrieved2025-10-27.
  13. ^"Data Privacy and Security: How to Safeguard Information in the Digital Age | Ironhack Blog".www.ironhack.com. Retrieved2025-10-27.
  14. ^"Data Masking Definition".Archived from the original on 2017-02-27. Retrieved1 March 2016.
  15. ^"data masking".Archived from the original on 5 January 2018. Retrieved29 July 2016.
  16. ^"Data Security: Definition, Importance, and Types".Fortinet. Retrieved2025-10-26.
  17. ^Michael Wei; Laura M. Grupp; Frederick E. Spada; Steven Swanson (2011)."Reliably Erasing Data From Flash-Based Solid State Drives".FAST'11: Proceedings of the 9th USENIX conference on File and storage technologies.Wikidata Q115346857. Retrieved2022-11-22.
  18. ^Rupp, Eduard; Syrmoudis, Emmanuel; Grossklags, Jens (2022)."Leave No Data Behind – Empirical Insights into Data Erasure from Online Services".Proceedings on Privacy Enhancing Technologies.ISSN 2299-0984.
  19. ^"data protection act".Archived from the original on 13 April 2016. Retrieved29 July 2016.
  20. ^Peter Fleischer,Jane Horvath,Shuman Ghosemajumder (2008)."Celebrating data privacy".Google Blog.Archived from the original on 20 May 2011. Retrieved12 August 2011.{{cite web}}: CS1 maint: multiple names: authors list (link)
  21. ^"GDPR Penalties". Archived fromthe original on 2018-03-31.
  22. ^"Detect and Protect for Digital Transformation".Informatica. Retrieved27 April 2018.
  23. ^"ISO/IEC 27001:2013".ISO. 16 December 2020. Retrieved2022-11-03.
  24. ^"ISO/IEC 27002:2013".ISO. 15 April 2021. Retrieved2022-11-03.
  25. ^"PCI DSS Definition".Archived from the original on 2 March 2016. Retrieved1 March 2016.
  26. ^Denning, Dorothy E., and Peter J. Denning. "Data security."ACM computing surveys (CSUR) 11.3 (1979): 227-249.
  27. ^Security, Stephen Cavey Blog Post Cybersecurity Data."Three Safeguards You Need For the HIPAA Security Rule | Ground Labs".www.groundlabs.com. Retrieved2025-10-27.

External links

[edit]
Wikimedia Commons has media related toData security.
Principles
Privacy laws
Data protection authorities
Areas
Information privacy
Advocacy organizations
See also
Retrieved from "https://en.wikipedia.org/w/index.php?title=Data_security&oldid=1323195635"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp