Skip to main content
  • Book
  • © 2022

Data Security

Technical and Organizational Protection Measures against Data Loss and Computer Crime

Authors:

(view affiliations)
  • Offers an easy to understand introduction

  • Shows numerous practical examples that can be implemented directly in companies and organizations

  • Presents technical correlations and hazards in relation to the implementation of data security

  • 4811 Accesses

Buying options

eBook
USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-658-35494-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 74.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (21 chapters)

  1. Front Matter

    Pages i-xi
  2. Introduction

    • Thomas H. Lenhard
    Pages 1-2
  3. Data Protection and Data Security

    • Thomas H. Lenhard
    Pages 3-4
  4. How Computers Communicate with Each Other

    • Thomas H. Lenhard
    Pages 5-13
  5. What Can Happen to Data?

    • Thomas H. Lenhard
    Pages 15-16
  6. Hazards in the Technical Environment

    • Thomas H. Lenhard
    Pages 17-24
  7. Dangerous Software

    • Thomas H. Lenhard
    Pages 25-39
  8. Telephone Systems

    • Thomas H. Lenhard
    Pages 45-49
  9. The Greatest Danger in a Digitalized World

    • Thomas H. Lenhard
    Pages 51-53
  10. Data Destruction

    • Thomas H. Lenhard
    Pages 55-60
  11. Data Backup and Restore

    • Thomas H. Lenhard
    Pages 61-64
  12. Encryption

    • Thomas H. Lenhard
    Pages 65-68
  13. Website Hacking

    • Thomas H. Lenhard
    Pages 69-71
  14. Common Security Problems

    • Thomas H. Lenhard
    Pages 73-76
  15. Identification of Computers and IP Addresses

    • Thomas H. Lenhard
    Pages 77-79
  16. The Firewall

    • Thomas H. Lenhard
    Pages 81-83
  17. The Router

    • Thomas H. Lenhard
    Pages 85-86
  18. Configuration of Security Systems

    • Thomas H. Lenhard
    Pages 87-92
  19. The Demilitarized Zone

    • Thomas H. Lenhard
    Pages 93-98

About this book

Using many practical examples and notes, the book offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the technical knowledge that is mandatory for data protection officers. Data security is an inseparable part of data protection, which is becoming more and more important in our society. It can only be implemented effectively if there is an understanding of technical interrelationships and threats. 

This book is a translation of the original German 2nd edition Datensicherheit by Thomas H. Lenhard, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020. The translation was done with the help of artificial intelligence (machine translation by the service DeepL.com). A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation. Springer Nature works continuously to further the development of tools for the production of books and on the related technologies to support the authors.


The Content

How computers communicate - Dangers to data files - Technical threats - Dangerous software - Dangers from mobile devices - Dangers of phone systems - Destruction of data - Securing data - Encryption - Identification of computers - Firewalls - Configuration problems - DMZ – etc.


The Target Groups

  • (Future) data protection officers
  • Lawyers who want to learn about data security
  • Executives who would like to gain an insight into IT security
  • Students of computer science and business informatics


The Author

Dr. Thomas H. Lenhard is an internationally recognized expert on information technology and data protection. He draws on a wealth of experience from three decades of data protection and data security.


Keywords

  • Data Protection
  • Privacy
  • Backup and Recovery
  • Dangers of IT use
  • Computer Sabotage
  • Computer Crime
  • Protective measures
  • Encryption
  • Getting started with data security
  • Data backup
  • Data destruction
  • Hacking
  • Trojan
  • Virus
  • Sniffer
  • Keylogger
  • Firewall
  • Router
  • Data Security
  • Technical and organisational measures

Authors and Affiliations

  • Comenius Universität, Bratislava, Slovakia

    Thomas H. Lenhard

About the author

Dr. Thomas H. Lenhard is an internationally recognized expert on information technology and data protection. He draws on a wealth of experience from three decades of data protection and data security.

Bibliographic Information

  • Book Title: Data Security

  • Book Subtitle: Technical and Organizational Protection Measures against Data Loss and Computer Crime

  • Authors: Thomas H. Lenhard

  • DOI: https://doi.org/10.1007/978-3-658-35494-7

  • Publisher: Springer Wiesbaden

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2022

  • Softcover ISBN: 978-3-658-35493-0

  • eBook ISBN: 978-3-658-35494-7

  • Edition Number: 1

  • Number of Pages: XI, 113

  • Number of Illustrations: 2 b/w illustrations, 8 illustrations in colour

  • Topics: Data and Information Security, Computer Science

Buying options

eBook
USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-658-35494-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 74.99
Price excludes VAT (USA)