5 WAYS TO SECURE YOUR DATA доклад по теме Информатика

Доклад раскрывает тему "5 WAYS TO SECURE YOUR DATA".
Презентация поможет подготовится к предмету Информатика, может быть полезна как ученикам и студентам, так и преподавателям.
Материал представлен на 7 страницах, оформлен в виде презентации, доступен для скачивания и просмотра онлайн.

Навигация по документу

Страница №1
5 WAYS TO SECURE YOUR DATA
Страница №2
WHY SECURE YOUR DATA
Protection of data is critical for most business and
sometimes even for home computer users. It is
potentially dangerous if the important and crucial
information falls into the wrong hands. Though
data can be lost due to variety of reasons bit losing
it to malware infections or trackers can have much
disastrous consequence. 
So let us look at the possible ways to secure our
data from unauthorized accesses.
WHY SECURE YOUR DATA Protection of data is critical for most business and sometimes even for home computer users. It is potentially dangerous if the important and crucial information falls into the wrong hands. Though data can be lost due to variety of reasons bit losing it to malware infections or trackers can have much disastrous consequence. So let us look at the possible ways to secure our data from unauthorized accesses.
Страница №3
1. Back up your data often
Most important step to protect your data is to
back it up regularly. There are plenty of ways to do
it. If you have external USB hard drive you can
back up to that drive using your computer’s built
in backup features. You can even use Windows
Backup, Time machine or connect the drive to the
computer and use the backup tool. Also rather
than storing your files on your computer’s hard
drive, you can store them on Google Drive,
Microsoft Onedrive.
1. Back up your data often Most important step to protect your data is to back it up regularly. There are plenty of ways to do it. If you have external USB hard drive you can back up to that drive using your computer’s built in backup features. You can even use Windows Backup, Time machine or connect the drive to the computer and use the backup tool. Also rather than storing your files on your computer’s hard drive, you can store them on Google Drive, Microsoft Onedrive.
Страница №4
2. Protecting data by using EFS (Encrypting File system)

One solution to reduce the potential for stolen
data is to encrypt sensitive files using Encrypting
File System (EFS) to increase the security of your
data. Encryption is the process of encoding
messages or information in such a way that only
authorized parties can read it. In order to use EFS,
users must have Encrypting file system documents
to encrypt and decrypt data. EFs users must have
the permission from NTFS to modify the files.
2. Protecting data by using EFS (Encrypting File system) One solution to reduce the potential for stolen data is to encrypt sensitive files using Encrypting File System (EFS) to increase the security of your data. Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In order to use EFS, users must have Encrypting file system documents to encrypt and decrypt data. EFs users must have the permission from NTFS to modify the files.
Страница №5
3. Using Public Key infrastructure
A public key infrastructure is technical mechanisms
and policies needed to create and revoke digital
certificates and manage public-key encryption
enabling users and computers to securely exchange
data. A certificate authority issues certificates to
individuals and groups after verifying their identity,
Certificate based security is stronger. The person who
can decrypt it is the holder of the public key which
makes your data even more secure.
3. Using Public Key infrastructure A public key infrastructure is technical mechanisms and policies needed to create and revoke digital certificates and manage public-key encryption enabling users and computers to securely exchange data. A certificate authority issues certificates to individuals and groups after verifying their identity, Certificate based security is stronger. The person who can decrypt it is the holder of the public key which makes your data even more secure.
Страница №6
4. Protecting through Internet Protocol Security
IPsec provides security, integrity and
confidentiality at packet processing layer of
network communication. IPSec provides two types
of security Authentication Header which
authenticates the sender of data and
Encapsulating Security Payload which
authenticates and encrypts the data of the sender.
4. Protecting through Internet Protocol Security IPsec provides security, integrity and confidentiality at packet processing layer of network communication. IPSec provides two types of security Authentication Header which authenticates the sender of data and Encapsulating Security Payload which authenticates and encrypts the data of the sender.
Страница №7
5. Protecting log in information
For various sites we use most of us have many
user names and passwords. Hence there are
management services with web interface which
stores encrypted passwords in private accounts.
So storing private data becomes easier and it is
safe.
5. Protecting log in information For various sites we use most of us have many user names and passwords. Hence there are management services with web interface which stores encrypted passwords in private accounts. So storing private data becomes easier and it is safe.