Search GSSD

Data Security: An Analysis

Data is the most precious asset on the Internet and must be protected from damage or errors through data security practice. First, users must protect themselves by recognizing risks and familiarizing themselves with data security terminology. Data security uses techniques such as Anti-viruses, anti-malware, spyware, encryption, access control, physical security, regular backups of data, and good security habits. Data security risks include: hacker, attacker, intruder, social engineering attack, fishing attack, malicious code, vulnerability, denial of service attack, and distributed denial of service (DDoS) attack. Viruses are programs that copy themselves onto other programs through transfers or infected disks and include worms, rootkits, botnets, spyware, keylogger, Trojan horses, adware, and clickbots. Good security habits are: minimize the access of other people, firewall, avoid being a victim, and responding to attack (avoid being part of the problem, knowing attack is happening).
Dr. S.B. Thorat, S.K. Nayak, M.M Bokhare
International Journal on Computer Science and Engineering (IJCSE)
Domains-Issue Area: 
Industry Focus: 
Information & Telecommunication
Internet & Cyberspace
Bibliographies & Reports