International Journal of Research Publication and Reviews, Vol 4, no 6, pp 3766-3772 June 2023 3769
16. Virus (Vital Information Resource Under Siege):-- Malfunction, deadlocks, hang, not expected output, corrupt files folders, applications,
delete file folders applications, spread from one program to another , interruptions, insertion of new thighs in a program are a few functions
may happen in the system. May we understand the level of malfunctionality of the system and in such a scenario how can we expect data to
secure. So Antivirus is a better option to protect our system from all these mentioned scenarios then up to some extent we can expect data
security and protection.
17. Installed Software:--Our devices like desktop, laptop, palmtop, Ipad, mobile phones which have an IPO(Input Process Output) cycle must
have input devices, processing unit and output devices inter connected to perform collectively and ready to produce required output as a result.
In the context of interconnected devices or any other device or devices that are connected at hardware side or any software that is installed
which is unknown to us about its functionality, purpose and dependency. may damage data used in these system. So be aware and get much
required information about such installed hardware and software if we want to secure our data for any unauthorized access. In case such
hardware and software which are not interdependent and not required for our system then they must be uninstalled and deleted as soon as
possible.
18. Attached Hardware:--We discussed this topic in previous topic in detail. So unwanted, unnecessary, nor required, not dependent hardware
must be detached at earliest.
19. Hidden file, folder, icon, path:--Some time users hide files, folders, applications etc..for security reasons. Any hidden application can steal
our data without our knowledge and use or misuse our data. So make sure that no such applications are hidden before using the system.
20. Auto fill:--This feature of the browser retains data regarding corresponding textbox and fills automatically if this is used. Even password ,
user , phone number, date of birth etc. that is confidential, private and highly sensitive data. This data can be used or misused by other users.
This feature should be off before using the system.
21. Save credentials in local host:-- Remember me, save password and store confidential data in the system causes data share, use. Avoid using
the data save option.
22. OS file management, memory management to save data automatically at client side offline mode too:-- At one side we advocate that
data can not be saved in the system using a related application and on the other side if data is not saved automatically then data could be lost.
Therefore OS should have a feature like data can be saved but not used by any unauthorized user.
where data can be damaged, lost or destroyed at
1. Power cut , sudden shut down or battery loss:--Unanticipatedly power cut , battery down or loss causes permanent data loss. Better is to
save data partially rather than save whole data at once or at last. Like google sheet has an option to save data automatically while using this
sheet online. Similarly data must be saved automatically in offline mode too.
2. Outer sources like accidents or damaged hardware:-- Hardware damage means software damage. In such types of cases nothing can be
done. However an alternative can be considered like before accidents , data whatever saved can be retrieved in a very hard device like black
box in the airplane.
3. Natural disasters flood, earthquake:--In offline mode data can not be saved in case hardware is damaged completely. In the previous point
a very hard material made device should be used to save data like black box in the airplane.
4. Stolen system:--Stolen system means, stolen data which can not be used by other users as a safety pattern must be developed and used.
5. Not saved data:-- Data should be saved automatically in offline mode too.
6. Human error:-- Human error is always there, and with this error a new technology is always invented and discovered.To avoid human error
, a few suggestions are suggested and implemented in most of the cases.
7. System Bugs:--Human error is natural and system bugs are the consequences of human errors. Avoiding this is not so easy but reduction can
be done.
8. Hardware dysfunction:--Hardware dysfunction means software dysfunction. Data security is concerned with the proper functionality of a
system.
9. System upgradation:--Sometimes it happens when a system is upgraded then existing data is lost. Do not believe in a system or software that
could save existing data , keep record or save existing data prior to upgrading the system.
Explanation:-
We will discuss those areas where data can travel and all possible solutions for data security and its protection with possible live examples one by one.
Let us make our discussion simpler, any device that can be either with or without internet connection further we can say online or offline mode
respectively.