The future of IT: Data Security
In today’s modern world, we are already surrounded by technologies. Data are stored digitally not like the past decades and centuries which are manually saved. It helps us work faster than before.
Before, data/information stored can be easily taken or stolen because they were in hard copies. Unlike nowadays, they are stored easily on a soft copy which are more easy way in terms of handling information. But, we must look also to the other side of the story, its security.
As we define data security, it refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption. Data security is the main priority for organizations of every size and genre.It is also known as information security (IS) or computer security. (https://www.techopedia.com/definition/26464/data-security)
Data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data. (http://www.spamlaws.com/data-security.html)
Data’s stored before has both advantage and disadvantage. Its disadvantage is that it can be wipe out through accidents like fire or etc., and can be stolen but they are more reliable and resourceful. Nowadays, data’s stored digitally, has both ends also. They can be gone because of viruses or access unauthorized with hackers because of the developing applications used. But its security can also be more secure through the development of its security systems and firewalls.
The development of the future of Information Technology in our society will really have both ends. This can be also in good way like more advance in data security and access or, it can be more accessible with an unauthorized access with hackers through the used of their advance applications and technologies also.
Image link: https://www.google.com.ph/search?q=data+security&rlz=1C1AVSX_enPH683PH683&tbm=isch&tbo=u&source=univ&sa=X&ved=0ahUKEwiegdnvzrjOAhUFnZQKHU28Aq4QsAQIXA&biw=1024&bih=667#imgdii=7kXbaMT4PSrN_M%3A%3B7kXbaMT4PSrN_M%3A%3BJY1p7NzO_iRviM%3A&imgrc=7kXbaMT4PSrN_M%3A
Posted here by:
BSIT III – IT 314