Lets have a brief look at data security terms, also it becomes interestingly necessary to understand the different between those terms such as, their objectives, algorithm and applications. Once we have clear distinction then we know where to apply these data security provisions.
Many technologies are leveraged to achieve business objectives and values to customer, but it comes with a price of security risk associated with them. Managing those risk would be an superficial act wasting time and money unless we understand how they are configured, maintained and operated, and then understanding the terms, definitions and concept associated with those technologies becomes paramount, Then you know how to control these risk effectively and efficiently