Want to make creations as awesome as this one?


More creations to inspire you


Horizontal infographics


Horizontal infographics


Horizontal infographics


Horizontal infographics


Horizontal infographics



Data protection is very different from data security. Security is designed to thwart a malicious attack against an organization's data and other IT resources, whereas data protection is designed to ensure data can be restored if necessary.

Data protection is important, since it prevents the information of an organization from fraudulent activities, hacking, phishing, and identity theft.

Data Protection/ Securtiy

When it comes to cybersecurity (i.e. computer, digital), we can agree that it refers to protective measures that we put in place to protect our digital assets from harmful events such as human and technical errors, malicious individuals, and unauthorized users.

Cyber security or IT security is the protection of networks, computer systems, cyber-physical systems and robots from theft or damage to their hardware and software or the data they process, as well as from interruption or misuse of the services and functions offered.

Difference between Data Privacy/ Data Security:

Data security

Data security is the process of protecting sensitive data from unauthorized access and corruption throughout its lifecycle.

Examples of Data Security Technology:

  • Authentication
  • Multi-Factor Authentication
  • Access control
  • Data Encryption
  • Email Security
  • Tokenization

Passwords, network and host-based firewalls, network intrusion detection systems, access control lists, and data encryption are examples of logical controls.

Information Security


Information security is used to provide protection for important informations from unauthorized access, theft or manipulation that threaten it. It also brovids the necessary tools and means to protect the informations from internal or external risks or attacks.

3 principles of information security:

  • Confidentiality: This means ensuring that only the authorized users have access to information.

  • Integrity: To protect information from being modified by unauthorized people and ensures that the information is trustworthy and accurate.

  • Availability: To ensure that the information is accessible to authorized people whenever it is needed.