The wider and more vulnerable internet network requires to realize the importance of data security. So that the security of private data is avoided from parties who want to use personal data for bad or criminal purposes. Those matters have been happening and fake accounts appear by stealing photos of others. These fake accounts usually intend to commit fraud and other cybercrime.
Meaning of Data Security
According to experts such as John D. Howard, the meaning of data security is an action to prevent a device from any form of network attacks.
Meanwhile, according to Gollmann, computer security is all matters relating to the protection and prevention of nuisance and not recognized actions in a computer system.
Data Security Technology
In general, data security technology is consisting of 6 forms and actions, they are:
- Disk encryption
Disk data encryption security technology refers to the use of hard disks. Hard disk is a hardware in the form of software. Disk encryption is also called transparent encryption or OTFE (on the fly encryption).
- Data security software
In protecting data, you can also use data encryption-based software to prevent data theft. Unfortunately, this technology is quite vulnerable from hackers who always have a way to break data encryption and steal all information. This causes the software can no longer be used.
Hardware security technology is quite safe, because to do an access must use physical access which is a token / PIN / password. This access can only be activated after the token is connected and the PIN is correct. This hardware security system is called biometrics. Privileges in access activation can only be operated by the owner.
With hardware security technology, it can prevent other users who want to do access activities. So that the software cannot be manipulated and is not easily damaged by hackers.
Backup is the recovery of lost data. This is a form of transfer into a secure access. By encrypting this data, you must move the data first and then delete all the data has been transferred.
- Data masking
Data masking is an action to cover certain data with a table of other cell databases. So that data can be determined to be safe and protected. Data masking is typically used in the banking world. Costumer’s data is usually covered with symbols. So the actual codes are not be able to be known.
- Data erasure
This security technology is the act of removing all sensitive data by overwriting methods. When deleting the data, it does not mean erase the data completely. Because all access activity will be stored automatically in the form of cache or temp. To that after deleting data should also remove all cache and temp until nothing is left.
Types of Data Security
Based on the system, data security consists of 5 types including:
- Network topology
Each computer network is divided into internal and external networks. For external network is also called the demilitarized zone, by utilizing these zones into the security data.
- 2IPS (Intrusion Prevention system)
The IPS system serves to protect the data security from external attacks. IPS work together with a firewall in deciding whether the package can be accepted or not.
- Security information management (SIM)
SIM centrally serves to provide a variety information related to computer network security. SIM has an ability to manage and analyze data using correlation and query techniques. So, it can provide a warning and reports of any attacks that interfere with data security.
- Fingerprint package
Fingerprint package is a security system that’s now widely applied to smartphones. Fingerprint package is also used in big companies that have a variety of network equipment and operating systems. So that network users can control all connected systems.
- Port Scanning
Port scanning is a security system using the ports on each application. This can be exploited by attackers to know which ports are open to the public. Each access sends an initiation package to every available port. If the port receives an answer from another port, the application will work after receiving a connection from that port. If there is no response from the port, the access will be closed.
Facts about the lack of data security on the internet
Here are some crucial facts about the internet world:
- Viruses and malware are very dangerous and widespread and can strike at any time. Terror from viruses and malware is always lurking and looking for loopholes in the destruction of the security system. As terror WannaCry being viral.
- Fraudsters always take advantage of all the data in any form to search for victims. All trick performed by fraudsters always run smoothly and sometimes vanish after the goal realized.
- All information on the internet can be accessed easily. This is often done by unauthorized parties in committing offense data. Usually, a data violation is used in an e-commerce transaction.
- Hackers always lurk financial accounts. A bank must release e-money based e-account services. The service is very efficient but also dangerous because the balance in e-money can always be broken by hackers.
- The emergence of various types of uncertain online companies. And some of them are working online. It is very difficult to distinguish between true and abstract companies.
Based on the full discussion of the importance of data security, it can serve as a warning to keep and protect all your personal data, and it must be ensured that your data is safe even if the data is trivial. The way to protect confidential data is to use software and data security applications such as Archangel.