Hosts include clients and servers that send or receive data or services. It is essential to protect host data because an organization can lose data if cyber criminals steal it or device fails. Few methods to protect host data are given below:
Encryption changes data using a complicated algorithm to make it unreadable. A special key returns the unreadable information again into readable data. Users can encrypt a whole hard drive in Windows utilizing a component called BitLocker. To use BitLocker, at least two volumes must be available on a hard disk. Only the user that encrypted the data will have the option to access the encrypted files. File encryption uses block ciphers.
Backing up data is one of the best methods for securing against data loss. In Data backup, a copy of the information from a computer is stored to removable backup media. If the computer hardware fails, the user can restore the data from the backup once the system is functional. Secure backups with passwords. The administrator at that point enters the password before restoring the data on the backup media. For additional security, keep backups to an offsite storage area.
File Access Control:
File Access control provides the ability to grant and revoke access to valuable files. Users ought not have the option to access all files on a server if they only need access to a single file.
Types of Permissions:
Users can create new files and folders and modify existing files and folders.
Users can open files and folders and read them.
Users can modify and delete existing files and folders but cannot create new ones.
- Full Control:
Users can read file contents, create new files and folders, and modify existing files and folders.
- Read and Execute:
Users can read the contents of files and folders and executes the programs.
- Network Safeguarding
- What is Local Host?
- Dynamic Host Configuration Protocol (DHCP)
- How DHCP server dynamically assigns IP address to a host?
- Program to determine class, Network and Host ID of an IPv4 address
- Electronic Data Interchange
- Data encryption standard (DES) | Set 1
- Data Concealment Methods
- Reliable Data Transfer (RDT) 1.0
- Reliable Data Transfer (RDT) 2.0
- Framing in Data Link Layer
- Data Compression With Arithmetic Coding
- Asynchronous serial data transfer
- Top 10 Biggest Data Breaches in 2018
- Principle Of Reliable Data Transfer Protocol
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.