Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 ROSHNI asked over 3 years ago

    0       0 Answer Now Comment Report
2 Answers
Data?1494421730 rohit awasthi answered over 3 years ago

Dear Friend > INFORMATION PROTECTION METHODS 1. Preventive Protection: This is based on use of security controls. This is based on three types of controls, i.e. Physical controls, Logical controls and Administrative controls. 2. Restorative Protection: It is necessary to have an effective and timely information backup and recovery plan. The main requirement is that information lost can be recovered. 3. Holistic Protection: Protection should be done in such a way that it gives business, appropriate level of security at a cost acceptable to business. Thanks

    0       1 Comment Report
Important Note – Preparing for CA Final?
CAKART provides Indias top faculty each subject video classes and lectures – online & in Pen Drive/ DVD – at very cost effective rates. Get video classes from Quality is much better than local tuition, so results are much better.
Watch Sample Video Now by clicking on the link(s) below – 
For any questions Request A Call Back  
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 CA Sandeep Bohra answered over 3 years ago

Dear friend, **Meaning and Importance of information** Information of the enterprises is the non- monetary asset and the capital. It is very important asset to the enterprise. It contains the confidential and important data of the company, leakage of that may be caused the damage to the enterprise. The information should be protected. Information is an asset that, like other important business assets, is essential to an organization's business and consequently needs to be suitably protected. This is especially important in the increasingly interconnected business environment. As a result of this increasing interconnectivity, information is now exposed to a growing number and a wider variety of threats and vulnerabilities, **Protection of Information or Data** 1.Strict information security responsibilities 2.Confidential agreements with employees and partners 3.Background checks and screening of employees 4.Information security education 5.Physically secured perimeter and security areas 6.Configuration and change management procedures 7.Proactive capacity management 8.Controls against malicious code 9.User access control and monitoring 10. Cryptographic controls 11.Proactive incident management. **Methods** When user develop a data security policy, you have to consider the following operations and methods: 1. Backup and reconstruction includes the Protecting of data by creating stand-alone duplicates of the files user prefer to recover where the authentic document is destroyed. Tag: back up data to. 2. Remote information movement is the real-time relocating of data to a certain location located beyond the principal backup system. One can also shift file to the different sets with the aim of protect it from physical damage to constructs. Generally off-site duplicate and reconstruction are employed for remote data shifting. 3. Storage system security needs employment of the protection methods aimed at enhancing server and network protection efforts. Tag: how to backup outlook. 4. Data life span control is a new approach comprising the computer-assisted movement of principal database to either online or autonomous storage. It is also about assessing and safeguarding data resources of the corporation exercising a data protection strategy.

    0       1 Comment Report
Get Notifications
Watch best faculty demo video classes

These top faculty video lectures will
help u prepare like nothing else can.