Data Protection Technologies
- Authors: Ankush1, Shivam2, Sanchit Dhankhar3, Nitika Garg4, Himanshu Sharma5, Samrat Chauhan6, Monika Saini7, Shushank Mahajan8
-
View Affiliations Hide Affiliations1 Ganpati Institute of Pharmacy, Bilaspur 135102, Haryana, India 2 Ganpati Institute of Pharmacy, Bilaspur 135102, Haryana, India 3 Chitkara College of Pharmacy, Chitkara University, Rajpura 140401, Punjab, India 4 Chitkara College of Pharmacy, Chitkara University, Rajpura 140401, Punjab, India 5 Ganpati Institute of Pharmacy, Bilaspur 135102, Haryana, India 6 Chitkara College of Pharmacy, Chitkara University, Rajpura 140401, Punjab, India 7 M.M. College of Pharmacy, Maharishi Markandeshwar (Deemed to be University), Mullana 133 207, Ambala, Haryana, India 8 Chitkara College of Pharmacy, Chitkara University, Rajpura 140401, Punjab, India
- Source: Data Recovery Techniques for Computer Forensics , pp 62-77
- Publication Date: April 2025
- Language: English
Data Protection Technologies, Page 1 of 1
< Previous page | Next page > /docserver/preview/fulltext/9789815274677/chapter-3-1.gif
The digital age, which can be defined as a collection of various technological solutions such as virtual environments, digital services, intelligent applications, machine learning, knowledge-based systems, etc., is responsible for determining the particulars of e-communications, virtualization, information sharing, intelligent applications, and other aspects of the modern world. These particulars are determined by the digital age. The uncontrolled access to information and personal data that is stored at various nodes of the global network poses a possible danger to some fundamental principles of information security and privacy, which may be violated by the technology that is prevalent in the digital era. The purpose of this article is to investigate the factors that distinguish information and personal data protection from other forms of protection, as well as to provide a summary of the most significant dangers to user privacy and security in the digital era. This chapter goes over the fundamentals of data protection architecture, as well as the components of information security that help ward off attacks and threats. In conclusion, the chapter concludes by presenting data protection as an endeavor that is constantly evolving and necessitates continuous adjustments in order to stay up with the ever-changing technical and risk landscape. In order to assist businesses in navigating the complexities of the digital age, this chapter provides insights and recommendations for the development of trustworthy data protection plans.
-
From This Site
/content/books/9789815274677.chapter-3dcterms_subject,pub_keyword-contentType:Journal -contentType:Figure -contentType:Table -contentType:SupplementaryData105