A secure data repository is a centralized storage location where data is isolated for reporting or analytical purposes. Different kinds of data repository exist such as data warehouses, lakes, and marts, each with its particular advantages and problems.
The data stored in a repository is typically gathered from various systems, such as point-of-sale and ERP systems, and is then centralized to allow analysis and reporting. This makes it easier for businesses to manage large amounts of data, as well as ensure that information is accurate and up-to-date. Security risks increase when the volume of data increases. To minimize these risks it is important to follow good practices in managing data that take a multi-faceted, secure approach to protecting data.
A secure data repository, for example, should have comprehensive access rules that allow only authorized users who have a legitimate business requirement to modify or transmit the information. These rules should also address retention requirements as well as other critical issues related to managing data. Additionally, a secure repository should include the use of digital signatures or other methods of verifying the authenticity of data.
Other important considerations for an effective data repository are making sure the software can be scaled to handle the increasing amount of data, and also ensuring that the system is properly backed up and protected against attacks from malicious hackers. A single computer crash or hacking attempt could wipe out all the data stored in the database.
http://www.computervirusnow.com/installing-avast-cleanup-mac-important-information/