{"id":5906,"date":"2022-02-01T18:31:38","date_gmt":"2022-02-01T18:31:38","guid":{"rendered":"https:\/\/webstyleclub.website\/smart-card\/?p=5906"},"modified":"2022-03-10T19:53:07","modified_gmt":"2022-03-10T19:53:07","slug":"what-is-security","status":"publish","type":"post","link":"https:\/\/www.smartcardbasics.com\/what-is-security\/","title":{"rendered":"What Is Security?"},"content":{"rendered":"
Smart cards provide computing and business systems the enormous benefit of portable and secure storage of data and value. At the same time, the integration of smart cards into your system introduces its own security management issues, as people access card data far and wide in a variety of applications.<\/p>\n
The following is a basic discussion of system security and smart cards, designed to familiarize you with the terminology and concepts you need in order to start your security planning.<\/p>\n
Security is basically the protection of something valuable to ensure that it is not stolen, lost, or altered. The term “data security” governs an extremely wide range of applications and touches everyone’s daily life. Concerns over data security are at an all-time high, due to the rapid advancement of technology into virtually every transaction, from parking meters to national defense.<\/p>\n
Data is created, updated, exchanged and stored via networks. A network is any computing system where users are highly interactive and interdependent and by definition, not all in the same physical place. In any network, diversity abounds, certainly in terms of types of data, but also types of users. For that reason, a system of security is essential to maintain computing and network functions, keep sensitive data secret, or simply maintain worker safety. Any one company might provide an example of these multiple security concerns: Take, for instance, a pharmaceutical manufacturer:<\/p>\n
Type of Data<\/th>\n | Security Concern<\/th>\n | Type of Access<\/th>\n<\/tr>\n |
---|---|---|
Drug Formula<\/td>\n | Basis of business income. Competitor spying<\/td>\n | Highly selective list of executives<\/td>\n<\/tr>\n |
Accounting, Regulatory<\/td>\n | Required by law<\/td>\n | Relevant executives and departments<\/td>\n<\/tr>\n |
Personnel Files<\/td>\n | Employee privacy<\/td>\n | Relevant executives and departments<\/td>\n<\/tr>\n |
Employee ID<\/td>\n | Non-employee access. Inaccurate payroll, benefits assignment<\/td>\n | Relevant executives and departments<\/td>\n<\/tr>\n |
Facilities<\/td>\n | Access authorization<\/td>\n | Individuals per function and clearance such as customers, visitors, or vendors<\/td>\n<\/tr>\n |
Building safety, emergency response<\/td>\n | All employees<\/td>\n | Outside emergency response<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/h3>\n","protected":false},"excerpt":{"rendered":"Smart cards provide computing and business systems the enormous benefit of portable and secure storage of data and value. At the same time, the integration of smart cards into your system introduces its own security management issues, as people access card data far and wide in a variety of applications. The following is a basic […]<\/p>\n","protected":false},"author":1,"featured_media":5649,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[175],"tags":[],"yoast_head":"\n |