Cybersecurity 101 - Part 2

Bala Madhusoodhanan - Jan 6 '23 - - Dev Community

This blog is exploring the concepts of data protection. Imagine that you have a special lock on your bedroom door to keep your belongings safe. Data protection services work in a similar way, but for information on the internet or on a computer. They help make sure that only the people who are supposed to have access to certain information can see it, and that it stays private and secure. Data protection services help keep information safe and private. They can include things like passwords to protect accounts, encryption to make data unreadable to anyone who doesn't have the right key, and firewalls to block unauthorized access to a network.

Below are the key components are capabilities that evaluated as part of Data Protection services

  1. Data governance - Imagine that you have a group of friends who play a game together. Data governance is like having a set of rules that everyone agrees to follow, like taking turns and not cheating. It helps make sure that the game is fair and everyone has fun. In the same way, data governance helps make sure that data is used in a way that is fair and responsible. Data governance is about making sure that data is used in a way that is fair, responsible, and follows the rules. This can include things like making sure that people's personal information is kept private and secure, or making sure that data is used for legitimate purposes. To enable better data governance its important to understand and classify the data in question (Data Classification). The Data Classification would determine the policies for Retention and Disposal . It is important to have data tagging to easy identify.

2.Data loss prevention (DLP) - Imagine that you have a special toy or game that is very important to you. You might take extra care to keep it safe, like putting it in a special place or making sure it doesn't get lost. DLP works in a similar way, but for information on the internet or on a computer. It helps make sure that important data is kept safe and secure, so it doesn't get lost or fall into the wrong hands. Data loss prevention (DLP) is a set of tools and techniques that help prevent data from being lost or stolen. This can include things like making backups of important information, using passwords to protect accounts, and setting up firewalls to block unauthorized access. The DLP covers a lot of topics ranging from Database Monitoring, Data Discovery, Data in Use, Data in Transit, Data at Rest, Data Masking, Digital Rights Management

3.Cryptographic services - Imagine that you have a secret message that you want to send to a friend. You could write it down and then scramble the letters so that it looks like a bunch of gibberish. Your friend would need to know the secret code (or key) to unscramble the message and read it. Cryptographic services work in a similar way, but with more advanced techniques and tools to keep information even more secure. Cryptographic services are tools and techniques that help keep information secure by making it difficult for anyone to read or access it without the right key. This can include things like encryption, which is a way of turning data into a secret code that can only be decrypted (or turned back into readable information) with the right key. Crypto service covers Key Mgmt, Certificate Management, Data encryption and Signature Services

In today's digital age, much of our personal and sensitive information is stored on computers and shared through the internet, which makes it vulnerable to being accessed or stolen by unauthorized parties. Data protection services help prevent this by providing layers of security to protect against potential threats. For example, strong passwords and two-factor authentication can help prevent unauthorized access to accounts, while encryption can make it difficult for anyone to read sensitive data even if they are able to access it.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .