The Importance Of Data Privacy And Security

2293 Words5 Pages

Privacy and Security are very important aspects in regards to computer databases and keeping them safe. Data Privacy is a way to keep your information secure, and keeping your information secure means it’s going to be kept private (vice versa). Information and data privacy is the relationship between gathering and classifying data and technologies while at the same time keeping them private in the context of the organization. While Computer security and IT security are defined as the means of security and how they translate to computers, their network infrastructures, and the data encompassing the databases that store this data and making sure they are kept safe and classified.
As far as computers are concerned and their security it is only …show more content…

At the end of the day all the security in the world does not guarantee that your information will be safe. And the more secure the system the less features that can be used by the group. This also mean it will take longer to create and implement, as well as keep up to date and make sure features are compatible. Again this becomes very annoying since steps have to be taken to setup this security. Also the complexity of security in general does not allow a guarantee that data will be kept safe from hackers, who can expose bugs, glitches, weaknesses, …show more content…

Now instead of changing the fundamentals of the operating system we should base our changes on user’s basic needs to get the job done. We should create a simple model of security features with little settings to allow flexibility. Three levels of security should be implemented to make this happen: Those accounts would be users, groups, and the rest of the world, with each having less authority then the last. This is how web browsers classify networks today .Now the data shared between these systems, both private and public would best be fit to three different parts of the file system. Those file systems being documents, including my documents, shared documents, and public documents. This gives use the advantage of being able to combine have secure data stored in familiar locations. This makes it easy for users to identify what each security item is and how to find their files. The rest can be handled by administrators and other authorized groups under security policies they

Open Document