-
Notifications
You must be signed in to change notification settings - Fork 12
/
Copy pathmain.html
82 lines (70 loc) · 4.5 KB
/
main.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
<!DOCTYPE html>
<html>
<head>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Data Security</title>
<style>
body {font-family: Arial, Helvetica, sans-serif;
background-color: black ;}
h1 {color: #009fe1;
font-family: verdana;
font-size: 300%;}
h2 {color:#008dc7;}
p {color: white;
font-family:courier;
border:1px solid blue;
font-size: 100%;
padding: 15px;}
ul {color: white;
font-family: verdana;
font-size: 100%
padding: 30px;
margin-right: 4px;}
}
</style>
</head>
<div>
<body>
<h1 align="center">Welcome to Data Security</h1>
<h2>What is Data Security????</h2>
<p>Data Security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security refers to data encryption, tokenization and key management practices that protect data across all applications and platforms.
Organizations around the globe are investing heavily in information technology (IT) cyber defense capabilities to protect their critical assets. Whether protecting a brand, intellectual capital, and customer information or providing controls for critical infrastructure, the means for incident detection and response to protect organizational interests have common elements: people, processes, and technology.</p>
<h2>Why Data Security?</h2>
<p>Organizations around the globe are investing heavily in information technology (IT) cyber defense capabilities to protect their critical assets. Whether protecting a brand, intellectual capital, and customer information or providing controls for critical infrastructure, the means for incident detection and response to protect organizational interests have common elements: people, processes, and technology.</p>
<h2>Data Security Solutions</h2>
<ul>
<li>Cloud Security</li>
<li>image description
Credentialing & PKI Applications</li>
<li>Data Security & Encryption</li>
<li>Payments</li>
<li>Digital Transformation</li>
</ul>
<h2>Data Security Resources</h2>
<ul>
<li><a href=>National Institute of Standards and Technology (NIST)</a></li>
<li><a href=>The Sys-Admin, Audit, Network and Security Institute (SANS)</a></li>
<li><a href=>Global Information Assurance Certification (GIAC)</a></li>
<li><a href=>United States Computer Emergency Readiness Team</a></li>
<li><a href=>Cybrary</a></li>
<li><a href=>Station X</a></li>
<li><a href=>Security Now! Podcast</a></li>
<li><a href=>Krebs on Security</a></li>
<li><a href=>Schneier on Security</a></li>
<li><a href=>Udemy</a></li>
</ul>
<h2>Protecting Your Data Security and Data Privacy</h2>
<p>The first step in protecting your enterprise's data privacy and security is to identify the types of information you want to protect and where that information is exposed in your organization. Once you have completed your audit - identified your organization's priority information and determined your level of risk of data loss - the next step is to assess your applications and understand what areas of your application portfolio are leaving you vulnerable to external attacks.
According to a recent Gartner report, the market for content-aware data loss prevention solutions continues to grow at more than 20 percent year over year. Yet the report also notes that many organizations are struggling to establish appropriate data protection policies and procedures for mobile devices as they interact with sensitive corporate data.</p>
<h2>Effectiveness of Traditional Data Security and Data Privacy Products</h2>
<ul>
<li>
Accuracy of data loss prevention content analysis engines. Content analysis methods range from keyword searching, regular expressions handling and document fingerprint matching. Like any other analysis engine, lowering the false-positive and false-negative rates are important to improve the solution's accuracy.</li>
<li>Scalability of data security solutions. As network traffic and employee use of multiple types of data grow, established data protection solutions must scale to keep up with organizational usage.</li>
<li>Sophistication of the data security policy definition and process management capabilities. Organizations typically have multiple policies for different types of data and multiple processes to manage data and respond to data loss related events. The ability to automate policy enforcement in people- and process-centric situations is important.</li>
</ul>
<a href="feedback.html"> <i>Feedback</i></a>
<a href="tools.html"> <i>Tools</i></a>
</body>
</div>
</html>