Hosts include clients and servers that send or receive data or services. It is essential to protect host data because an organization can lose data if cyber criminals steal it or device fails. Few methods to protect host data are given below:
Encryption changes data using a complicated algorithm to make it unreadable. A special key returns the unreadable information again into readable data. Users can encrypt a whole hard drive in Windows utilizing a component called BitLocker. To use BitLocker, at least two volumes must be available on a hard disk. Only the user that encrypted the data will have the option to access the encrypted files. File encryption uses block ciphers.
Backing up data is one of the best methods for securing against data loss. In Data backup, a copy of the information from a computer is stored to removable backup media. If the computer hardware fails, the user can restore the data from the backup once the system is functional. Secure backups with passwords. The administrator at that point enters the password before restoring the data on the backup media. For additional security, keep backups to an offsite storage area.
File Access Control:
File Access control provides the ability to grant and revoke access to valuable files. Users ought not have the option to access all files on a server if they only need access to a single file.
Types of Permissions:
Users can create new files and folders and modify existing files and folders.
Users can open files and folders and read them.
Users can modify and delete existing files and folders but cannot create new ones.
- Full Control:
Users can read file contents, create new files and folders, and modify existing files and folders.
- Read and Execute:
Users can read the contents of files and folders and executes the programs.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Network Safeguarding
- How DHCP server dynamically assigns IP address to a host?
- Program to determine class, Network and Host ID of an IPv4 address
- Dynamic Host Configuration Protocol (DHCP)
- What is Local Host?
- Working of Dynamic Host Configuration Protocol
- Difference between Data Privacy and Data Security
- Difference between Data Privacy and Data Protection
- Maximum Data Rate (channel capacity) for Noiseless and Noisy channels
- Data Compression With Arithmetic Coding
- Framing in Data Link Layer
- Synchronous Data Link Control (SDLC) Loop Operation
- Asynchronous serial data transfer
- Data encryption standard (DES) | Set 1
- Shannon-Fano Algorithm for Data Compression
- Electronic Data Interchange
- Top 10 Biggest Data Breaches in 2018
- Difference Between High-level Data Link Control (HDLC) and Point-to-Point Protocol (PPP)
- Principle Of Reliable Data Transfer Protocol
- Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) in Data Link Layer
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.