From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Understanding data security

Understanding data security

- [Lecturer] In this section, we're going to go over the concepts of security operation, data handling best practices, different concepts of logging and monitoring within your infrastructure, and then summarizing the different types of encryption and their common use. As you know, data goes through a life lifecycle as users and machines create, use, share, and modify data. Conceptually, this data handling process involve the creation of the data, which was previously undocumented, then storing it or recording it in some type of fashion. Then using that data, which may cause the information to be modified, supplemented, partially deleted, and so on. then sharing the data with other people or other machines, or typing the data whenever it's temporarily not needed, and then at the end, destroying the data whenever it's no longer needed. And this is where a lot of organizations actually fail on having a good data destruction or data disposition, data retention type of policy or program…

Contents