How to Secure your Data

How to Secure your Data



How to Secure your Data

Database security is very important. This is because the database may contain personal or confidential information, may contain business information, or may contain important government information. The issue of database security is viewed from multiple perspectives. First, data security must be provided so that data is not lost, or data loss does not occur. For this you have to take regular data backup, that is, data copy is made. If you make a copy of the data and put it on the same hard disk, if there is any problem with the original data (which is called data corruption) then that data can be restored from the backup. But data backups are kept on separate hard disks considering the possibility that the entire hard disk may crash or be damaged. Considering the importance of data, data backups are also kept in separate data centers so that data can be restored in case of any disaster like fire, earthquake, etc. So the data centers are in different cities. The database also has a system to prevent unwanted people or systems from viewing or modifying data. This is also an important aspect of data security. For example, no one will be able to access the database system without a password. Again, users can only work with certain tables in the database. Again, users will only be able to view data (SELECT) in some corners, but will not be able to change (INSERT, UPDATE, DELETE). For this, different types of permission can be fixed. Although the Esculite database does not have this feature, the Oracle, PasteGrace, MySQL, SQL Server, etc. databases have such security measures.


Data Encryption


How to Secure your Data


When data is stored on a hard disk or data is exchanged over a network, data must be encrypted to protect the confidentiality of that data. Otherwise, the unwanted person or system may drop that data. The idea of ​​encrypting data is not new, or it is only related to computers. Even thousands of years ago, people used to encrypt data so that no one but the person to whom the data is being sent could decrypt that data. Roman Emperor Julius. Caesar would write his letters in a manner that was encrypted and to whom the letter would go, he could only decrypt or recover the meaning of the letter. During the First and Second World Wars, many mathematicians worked with this encryption method to encrypt messages between enemy parties, as well as securely encrypt data between allies. Research and work on data encryption in the branch of computer science
Acting, it is called cryptography.
The principle of encryption is to encrypt the original data first. It is his job to send that data. The original data is called plain text and after encrypting that data is called ciphertext. Then another system works to retrieve the original data from the ciphertext. There are basically two types of data encryption methods
1. Symmetric key cryptography
2. Asymmetric key cryptography
Symmetric key cryptography
A special key in this method. The data is encrypted using and both the sender and the customer have to have this key. The sender encrypts the data using this key and the customer uses this key. Decrypts the data. Although this method is quite effective, when data is exchanged between two different parties, there are difficulties for two special reasons. First, make sure that the key that is used is not known to anyone else. While this may seem like an easy task, it is actually a very difficult task. Second, if one party exchanges data with many, a different key has to be used for each party. Now, catch up. Let's face it, with millions of subscribers on an e-commerce site, it's not realistic to use individual keys to encrypt data with each of them.
Asymmetric key cryptography
Each system creates a pair of keys using a special algorithm. By doing this, one of which is a public key and the other is the private key. Now every system lets everyone know its public key.
So 
A has the public keys of B and C. Now if A wants to send data to B, then encrypts that data with B's public key. You need to use B's private key to decrypt this data, so no one else can decrypt this data. Similarly, to send data to C, data must be sent using C's public key, which can only be decrypted by C. If C is encrypted without using the public key, it is possible for C to decrypt that data. No. Similarly, to send data to A, the data must be encrypted using A's public key, which A can decrypt using its private key.

The Story of Pre-Islamic Arabia


RDBMS

How to Secure your Data


Its feature is the concept of relational database introduced by Edgar Frank Codd. At that time he mentioned 12 features that should be in the relational database system. Different database builders try to adhere to the features when creating databases on their own. Having some common features of relational database
A relational database system can perform all sorts of tasks using only tables and the relationships between them. All data in the database will be stored in the table. The data in that corner is expressed as the value of a cell (in specific rays and columns) of a table
Will be Where data in the database specifies the table name, primary key (or value of RA) and
In other cases, the values ​​of other columns can be found. For example, tenth-grade rail. The query is required to get the name of the student who is number 1,
SELECT name FROM student was roll 

1 AND class - 10;
The database must have one or more inserts, updates, and deletions. For example, if you want to take all the students of the ninth class to tenth class, you can write such queries: UPDATE student SET class - 10 were class - 9;
In this case, for all the students in the student table whose class value is 9, that value is 10
Changing the internal corners of the database will not affect the corners of those who use the database. The format in which the data is stored on the disk may be changed, but users who will use the database do not need to know or bother about it. They will be able to access the data as before.
Databases use a variety of software application databases using the provided interface
Can do Make internal changes if needed in the database without changing the interface
Will go Database data is stored on multiple disks or multiple computers
The user does not have to worry. The user will feel that the database is storing data in one place.


 Use of RDBMS


The use of RDBMS is very wide and extensive. Although in Bangladesh now a touch of information technology at all levels. Didn't feel like it, so there's a lot to do here. Databases are used to store various types of information of public-private organizations. The information contained in the national identity card is stored in the database. Then various information like passport, driving license, medical, agriculture, land account, etc. is stored in the database. E-commerce websites offer a wide range of products to purchase. In this case, keeping the product information, keeping the customer information, the product delivery system of the customers — the software that is used to manage this whole process, is at the root of the database. Relational databases are also used in banks, insurance, and various financial institutions. In this case, the database is required to manage customer information, transactions, etc. Databases are used to manage student information, teacher information, student admissions, attendance information, test results, etc. in educational institutions.

Contribution of Sumerian civilization in science and technology


Corporate Database


How to Secure your Data


 Large corporations have to deal with many types of data. Many of these tasks are interdependent one does not happen and the other does not. For example, if a product is not in stock, it cannot be sold. Now there is a type of software to run this corporation, which is called ERP (ERP: Enterprise Resource Planner). ERP software has different modules, different organizations use different modules according to their needs. Some common modules are Accounts (for all types of accounting), Inventory (inventory-product inventory management), Pay-Rail (payroll-Employee pay-allowance accounting), Customer relationship management. Etc. Data is at the root of all this and therefore proper management of data is very important. Again, the offices of different large organizations can be in more than one city, even in more than one country. The main challenge of the corporate database is to bring all the information of all the offices under one system. With that data Ensuring safety is also an important issue.
Database in Government Organization
The use of databases is very important in government organizations. Different government organizations work with different information about the citizens of the country. But if you don't use the database or don't use it properly, there is no coordination between those organizations. Due to this, the citizens have to suffer a lot and millions of working hours are wasted in government institutions. For example, information and fingerprints of all citizens of Bangladesh are collected during the preparation of the national identity cards. A special organization in the government corner works to store and manage that information. Now when it comes to creating a passport, everyone has to fill in all the information again. This task can be easily avoided by making proper use of the database by coordinating the software of the two organizations.
Let's give another example. After passing the HSC exam, many people go to different universities to take the admission test. There he has to go through various hassles including filling up the registration form. The Board of Education has but a student's information and his secondary and higher secondary examination results stored in the database. With the proper use of this database, there is no need to provide the same information in a separate registration form. In the meantime, some universities have made this process easier for them. There is a lot of work to be done in hundreds of such government organizations, where a lot of work can be done in less time and with less hassle if the database is used and coordinated properly.
Another good use of databases in government organizations can be through the introduction of the data-based decision-making process. By storing different types of data properly, it becomes easier to use that data to decide when to do something in the future. Education, health, agriculture — in these cases, it is possible to extract a lot of information by using and analyzing the data of the previous year, which helps to determine what to do next year. For example, if the data of rages in different public and private hospitals are in a central database, then it is possible to easily determine which rage is more prevalent at which time, in which region. In that case, it is possible to take precautionary measures in advance, ensure the supply of necessary medicines, etc.
The main challenges of using databases in government organizations are to ensure data security, to ensure efficient supply of huge amounts of data management, to ensure that different organizations do not use the same data separately but exchange data among themselves). Etc.

Like More To Read

The Database Management system

How this Communication System

Post a Comment

0 Comments