Mindset of Treating all Data equally is a big Problem!



 Hey Everyone it Looper back again . Its pretty difficult when a IS guy or a person which is meant to be securing your data is treating the data .Data that has to be secure . When a IS guy in field the Business supervisors need to order data as indicated by its affect-ability and its value to the association so they can accurately assess and support various degrees of assurance. 

In my opinion The objective is to associate an assortment of criteria, including administrative consistence command, application use, get to recurrence, update cost and serious powerlessness to show up at both an incentive for the data and a proportion for deciding legitimate security costs.So in order to maintain that it had divided basically in three type. 

Data in use is data that is currently being updated, processed, erased, accessed or read by a system. This type of data is not being passively stored, but is instead actively moving through parts of an IT infrastructure. Examples of data is Database/File Sharing/ Desktop

Data at rest in information technology means inactive data that is stored physically in any digital form like archives, tapes, off-site backups, mobile devices

Data in motion also referred to as data in transit or data in flight, is digital information that is in the process of being transported between locations either within or between computer systems.
Like copier,printer,removable media,scan,clip board-email,network,
chat session

So When you know what type of data is to be secure, You can secure it Easily.

LOOPER


Comments