10. DATA PROTECTION
To process of protecting sensitive information
from damage, loss, or corruption.
11. DATA PROTECTION STRATEGIES
Data security – Safe the data from Virus (or)
Malware
Data availability – Restore the data (Ex. Backup)
Access Control – Authentication.
12. DATA SECURITY INCLUDES
Cryptography
Encryption – The plain text is converted to
cipher text.
16. PRINCIPLES OF DATA PROTECTION
Information Life Cycle Management – It is
hierarchical storage management.
17. PRINCIPLES OF DATA PROTECTION
Strategies of ILCM - It is used to determine the
how data is shifted, terminated or destroyed.
Automated storage in tree structure.
27. STRONG PASSWORD SET
Avoid the sequential numbers or letters
Avoid the two wheeler or car numbers
Avoid the phone numbers
Avoid the door numbers and date of birth
Use small and capital letters, symbols and
numbers
Avoid the reuse password