Back to Course
Data Protection in the IT Department
0% Complete
0/0 Steps
-
Introduction IT Security1 Topic
-
Protection Goals4 Topics|1 Quiz
-
Encryption and Signature3 Topics|1 Quiz
-
Deletion of Data1 Topic|1 Quiz
-
IT-Forensics1 Topic|1 Quiz
-
Safety in the Network4 Topics|1 Quiz
-
Attack Scenarios2 Topics|1 Quiz
-
IT Security in the Overall Concept3 Topics|1 Quiz
-
Cloud Computing1 Topic|1 Quiz
-
IT Security Act and IT Communication2 Topics|1 Quiz
Lesson 2, Topic 3
In Progress
Availability
Lesson Progress
0% Complete
Another protection goal of availability is to ensure that personal data can be accessed and processed without delay. Another protection goal within availability is the proper use of data in the foreseen process, such as the retrieval of customer files.
In concrete terms, this means the retrievability of data, for example, through:
- Structured databases
- Data management systems
- Search functions

Common measures to implement availability are for example
- The creation of backup copies of data, configurations and data structures
- Protecting against malware from outside, for example, by using vigilance and security tools such as a firewall and anti-virus software.
- It is also advisable to prepare an emergency concept for the recovery of processing operations.