Data Security and Protection

1. Overview of Data Security and Protection:

  • Definition: Data security is the process of protecting critical business assets (data) against unauthorized or unwanted use.

  • Goal: To combine people, processes, and technology to protect data throughout its life cycle.

  • Team Effort: Enterprise data protection is a collective effort involving multiple stakeholders.

2. CIA Triad (Confidentiality, Integrity, Availability):

  • Confidentiality: Ensuring data secrecy, where access is restricted to authorized actors.

    • Example: A university student’s financial records are accessible to parents, but academic records are not unless authorized.

  • Integrity: Ensuring data is trustworthy, accurate, and untampered.

    • Example: Only certain actors, like instructors, should be allowed to change grades.

  • Availability: Ensuring data is accessible by appropriate users within a reasonable time frame.

    • Example: Academic progress information must be available during course registration but not necessarily 24/7.

3. Data at Rest vs. Data in Transit:

  • Data in Transit: Data being transmitted from one point to another (e.g., over networks).

  • Data at Rest: Data stored on endpoints like servers, laptops, mobile devices, and backup devices.

4. Threats to Data:

  • Deliberate Attacks: Intentional actions by bad actors aiming to compromise systems and steal or damage data.

    • Types: Denial of Service, socially engineered attacks, internal and external threats.

  • Inadvertent Attacks: Accidental breaches due to hardware failure, natural disasters, or human error.

  • Threat Profiles: Used to predict potential threats and determine protective measures.

5. Importance of Data Protection:

  • Revenue and Profits: Data breaches can cut into revenue and increase costs.

  • Reputation: Breaches can damage an organization’s reputation.

  • Regulatory Mandates: Legal and industry standards may impose penalties or requirements for data breaches.

  • Digital Transformation: Data protection is essential for organizations moving services online or developing new offerings.

6. Key Considerations:

  • Cost of Attacks: Understanding the financial impact of data breaches can be challenging, especially when assessing intangible assets like reputation.

  • Security Investment: While it’s important not to overspend on security, some assets, like brand reputation, are difficult to quantify.

7. Challenges and Pitfalls:

  • Data security and protection are necessary but come with significant challenges, including managing both intentional and unintentional threats and aligning security investments with asset value.

Last updated