<s>
Data	B-General_Concept
security	I-General_Concept
means	O
protecting	O
digital	B-General_Concept
data	I-General_Concept
,	O
such	O
as	O
those	O
in	O
a	O
database	O
,	O
from	O
destructive	O
forces	O
and	O
from	O
the	O
unwanted	O
actions	O
of	O
unauthorized	O
users	O
,	O
such	O
as	O
a	O
cyberattack	O
or	O
a	O
data	O
breach	O
.	O
</s>
<s>
Disk	O
encryption	O
refers	O
to	O
encryption	O
technology	O
that	O
encrypts	O
data	O
on	O
a	O
hard	B-Device
disk	I-Device
drive	I-Device
.	O
</s>
<s>
However	O
,	O
a	O
malicious	O
program	O
or	O
a	O
hacker	B-Application
could	O
corrupt	O
the	O
data	O
to	O
make	O
it	O
unrecoverable	O
,	O
making	O
the	O
system	O
unusable	O
.	O
</s>
<s>
The	O
current	O
state	O
of	O
a	O
user	O
of	O
the	O
device	O
is	O
read	O
by	O
controllers	O
in	O
peripheral	B-Device
devices	I-Device
such	O
as	O
hard	B-Device
disks	I-Device
.	O
</s>
<s>
Illegal	O
access	O
by	O
a	O
malicious	O
user	O
or	O
a	O
malicious	O
program	O
is	O
interrupted	O
based	O
on	O
the	O
current	O
state	O
of	O
a	O
user	O
by	O
hard	B-Device
disk	I-Device
and	O
DVD	O
controllers	O
making	O
illegal	O
access	O
to	O
data	O
impossible	O
.	O
</s>
<s>
Hardware-based	O
access	O
control	O
is	O
more	O
secure	O
than	O
the	O
protection	O
provided	O
by	O
the	O
operating	O
systems	O
as	O
operating	O
systems	O
are	O
vulnerable	O
to	O
malicious	O
attacks	O
by	O
viruses	O
and	O
hackers	B-Application
.	O
</s>
<s>
The	O
data	O
on	O
hard	B-Device
disks	I-Device
can	O
be	O
corrupted	O
after	O
malicious	O
access	O
is	O
obtained	O
.	O
</s>
<s>
A	O
hacker	B-Application
or	O
a	O
malicious	O
program	O
cannot	O
gain	O
access	O
to	O
secure	O
data	O
protected	O
by	O
hardware	O
or	O
perform	O
unauthorized	O
privileged	O
operations	O
.	O
</s>
<s>
Backups	B-Protocol
are	O
used	O
to	O
ensure	O
data	O
that	O
is	O
lost	O
can	O
be	O
recovered	O
from	O
another	O
source	O
.	O
</s>
<s>
It	O
is	O
considered	O
essential	O
to	O
keep	O
a	O
backup	B-Protocol
of	O
any	O
data	O
in	O
most	O
industries	O
and	O
the	O
process	O
is	O
recommended	O
for	O
any	O
files	O
of	O
importance	O
to	O
a	O
user	O
.	O
</s>
<s>
Data	B-General_Concept
masking	I-General_Concept
of	O
structured	O
data	O
is	O
the	O
process	O
of	O
obscuring	O
(	O
masking	O
)	O
specific	O
data	O
within	O
a	O
database	O
table	O
or	O
cell	O
to	O
ensure	O
that	O
data	B-General_Concept
security	I-General_Concept
is	O
maintained	O
and	O
sensitive	O
information	O
is	O
not	O
exposed	O
to	O
unauthorized	O
personnel	O
.	O
</s>
<s>
Data	O
erasure	O
is	O
a	O
method	O
of	O
software-based	O
overwriting	O
that	O
completely	O
wipes	O
all	O
electronic	O
data	O
residing	O
on	O
a	O
hard	B-Device
drive	I-Device
or	O
other	O
digital	O
media	O
to	O
ensure	O
that	O
no	O
sensitive	O
data	O
is	O
lost	O
when	O
an	O
asset	O
is	O
retired	O
or	O
reused	O
.	O
</s>
<s>
The	O
international	O
standards	O
ISO/IEC	O
27001:2013	O
and	O
ISO/IEC	O
27002:2013	O
cover	O
data	B-General_Concept
security	I-General_Concept
under	O
the	O
topic	O
of	O
information	O
security	O
,	O
and	O
one	O
of	O
its	O
cardinal	O
principles	O
is	O
that	O
all	O
stored	O
information	O
,	O
i.e.	O
</s>
<s>
The	O
Payment	O
Card	O
Industry	O
Data	B-General_Concept
Security	I-General_Concept
Standard	O
(	O
PCI	O
DSS	O
)	O
is	O
a	O
proprietary	O
international	O
information	O
security	O
standard	O
for	O
organizations	O
that	O
handle	O
cardholder	O
information	O
for	O
the	O
major	O
debit	O
,	O
credit	O
,	O
prepaid	O
,	O
e-purse	O
,	O
automated	O
teller	O
machines	O
,	O
and	O
point	O
of	O
sale	O
cards	O
.	O
</s>
