Encyclopedia of Security and Emergency Management

Living Edition
| Editors: Lauren R. Shapiro, Marie-Helen Maras

Data Protection

  • M. Nazrul IslamEmail author
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-69891-5_95-1


Information: Anything that contains something which is timely delivered and will be useful to an audience.

Data: Binary bits stored on a digital media and processed by a processor. The bits can represent different types of information, text, audio, image, video, depending upon the software tool used to process the data.

Data security: Protection of digital data from unauthorized access, unintended modification, or fabrication, and ensuring safe delivery to authorized recipients.

Data breach: Unauthorized access to data.

Hardware: Digital devices that process, transmit, and store binary data.

Software: Programming codes that process binary data.


We are living in a digital society where all our personal, social and professional activities involve either generation, processing, or storage of digital data. Every organization, small or large, private or federal, technical or nontechnical, deals with a huge amount of digital data, which contains either confidential,...


Data breach Data security Data availability Data management Top secret data 
This is a preview of subscription content, log in to check access.


  1. Fadia, A., & Zacharia, M. (2008). Network intrusion alert: An ethical hacking guide to intrusion detection. Boston, Massachusetts: Course Technology.Google Scholar
  2. Gartner. (2018). Gartner worldwide IT spending forecast, Gartner Market Databook. https://www.gartner.com
  3. Islam, M. N., Islam, M. F., & Shahrabi, K. (2015). Robust information security system using steganography, orthogonal code and joint transform correlation. International Journal for Light and Electron Optics, 126, 4026–4031.CrossRefGoogle Scholar
  4. Muhleisen, M. (2018). The long and short of digital revolution. Finance & Development, International Monetary Fund.Google Scholar
  5. Stair, R. M., & Reynolds, G. W. (2017). Fundamentals of information systems. Boston, Massachusetts: Cengage Learning.Google Scholar
  6. Stallings, W., & Brown, L. (2018). Computer security: Principles and practice. Upper Saddle River, New Jersey: Pearson.Google Scholar
  7. Whitman, M. E., & Mattord, H. J. (2016). Principles of information security. Boston, Massachusetts: Cengage Learning.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Farmingdale State CollegeState University of New YorkFarmingdaleUSA