0
0
Answer Now
Comment
Report
2
Answers
Dear Friend
> INFORMATION PROTECTION METHODS
1. Preventive Protection: This is based on use of security controls. This is based on three types of controls, i.e. Physical controls, Logical controls and Administrative controls.
2. Restorative Protection: It is necessary to have an effective and timely information backup and recovery plan. The main requirement is that information lost can be recovered.
3. Holistic Protection: Protection should be done in such a way that it gives business, appropriate level of security at a cost acceptable to business.
Thanks
Important Note โ Preparing for CA Final?
CAKART provides Indias top faculty each subject video classes and lectures โ online & in Pen Drive/ DVD โ at very cost effective rates. Get video classes from CAKART.in. Quality is much better than local tuition, so results are much better.
Watch Sample Video Now by clicking on the link(s) below โ
For any questions Request A Call Back
Dear friend,
**Meaning and Importance of information**
Information of the enterprises is the non- monetary asset and the capital. It is very important asset to the enterprise. It contains the confidential and important data of the company, leakage of that may be caused the damage to the enterprise. The information should be protected.
Information is an asset that, like other important business assets, is essential to an organization's business and consequently needs to be suitably protected. This is especially important in the increasingly interconnected business environment. As a result of this increasing interconnectivity, information is now exposed to a growing number and a wider variety of threats and vulnerabilities,
**Protection of Information or Data**
1.Strict information security responsibilities
2.Confidential agreements with employees and partners
3.Background checks and screening of employees
4.Information security education
5.Physically secured perimeter and security areas
6.Configuration and change management procedures
7.Proactive capacity management
8.Controls against malicious code
9.User access control and monitoring
10. Cryptographic controls
11.Proactive incident management.
**Methods**
When user develop a data security policy, you have to consider the following operations and methods:
1. Backup and reconstruction includes the Protecting of data by creating stand-alone duplicates of the files user prefer to recover where the authentic document is destroyed. Tag: back up data to.
2. Remote information movement is the real-time relocating of data to a certain location located beyond the principal backup system. One can also shift file to the different sets with the aim of protect it from physical damage to constructs. Generally off-site duplicate and reconstruction are employed for remote data shifting.
3. Storage system security needs employment of the protection methods aimed at enhancing server and network protection efforts. Tag: how to backup outlook.
4. Data life span control is a new approach comprising the computer-assisted movement of principal database to either online or autonomous storage. It is also about assessing and safeguarding data resources of the corporation exercising a data protection strategy.