Skip to main content

Data Protection

Encyclopedia of Security and Emergency Management
  • 66 Accesses

Definitions

Information: Anything that contains something which is timely delivered and will be useful to an audience.

Data: Binary bits stored on a digital media and processed by a processor. The bits can represent different types of information, text, audio, image, video, depending upon the software tool used to process the data.

Data security: Protection of digital data from unauthorized access, unintended modification, or fabrication, and ensuring safe delivery to authorized recipients.

Data breach: Unauthorized access to data.

Hardware: Digital devices that process, transmit, and store binary data.

Software: Programming codes that process binary data.

Introduction

We are living in a digital society where all our personal, social and professional activities involve either generation, processing, or storage of digital data. Every organization, small or large, private or federal, technical or nontechnical, deals with a huge amount of digital data, which contains either confidential,...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Data Protection Act. (2018). http://www.legislation.gov.uk/ukpga/2018/12/contents/enacted

  • Fadia, A., & Zacharia, M. (2008). Network intrusion alert: An ethical hacking guide to intrusion detection. Boston, Massachusetts: Course Technology.

    Google Scholar 

  • Gartner. (2018). Gartner worldwide IT spending forecast, Gartner Market Databook. https://www.gartner.com

  • Islam, M. N., Islam, M. F., & Shahrabi, K. (2015). Robust information security system using steganography, orthogonal code and joint transform correlation. International Journal for Light and Electron Optics, 126, 4026–4031.

    Article  Google Scholar 

  • Muhleisen, M. (2018). The long and short of digital revolution. Finance & Development, International Monetary Fund.

    Google Scholar 

  • Stair, R. M., & Reynolds, G. W. (2017). Fundamentals of information systems. Boston, Massachusetts: Cengage Learning.

    Google Scholar 

  • Stallings, W., & Brown, L. (2018). Computer security: Principles and practice. Upper Saddle River, New Jersey: Pearson.

    Google Scholar 

  • Whitman, M. E., & Mattord, H. J. (2016). Principles of information security. Boston, Massachusetts: Cengage Learning.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Nazrul Islam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Islam, M.N. (2019). Data Protection. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_95-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69891-5_95-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69891-5

  • Online ISBN: 978-3-319-69891-5

  • eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics

Chapter history

  1. Latest

    Data Protection
    Published:
    29 June 2019

    DOI: https://doi.org/10.1007/978-3-319-69891-5_95-2

  2. Original

    Data Protection
    Published:
    28 February 2019

    DOI: https://doi.org/10.1007/978-3-319-69891-5_95-1