Chapter 8Keeping Data Safe and Secure

Security is the most discussed topic in the IT industry. Once a computer is connected to a network, it becomes immediately vulnerable to all sorts of malicious activities. If the computer and the networking devices encompassing it have not been configured to prevent such activities, then any resource, document, or service on the computer is vulnerable. Depending on what is hosted on the computer, the loss of it, the tampering with it, or the publication of it can have catastrophic consequences for the data owner and the business they work for. ...

Get MCA Microsoft Certified Associate Azure Data Engineer Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.