country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

ISYS326-Major Issues That Are Faced Due To Data Security

tag 0 Download5 Pages / 1,080 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question

You are required to prepare a report based on your collected paper on Data Security. Your report must be supported by references through additional readings. Your active participation in the class will also be taken into account & may be assessed (only for on campus students).
 
 

Answer:

Introduction 

Data security is a way to protect the sensitive and confidential data stored over the digital network. Data security assures that no unauthorised user is allowed to access the data. In short it can be stated, that data security is used to protect the data from being breached. It is every important to undertake data security measures so that data is accessed only by valid user (Harfoushi, et. al, 2014). In this report, a detail description about the overview of the project and its scope is defined. This report also covers the major issues that are faced due to data security.

Purpose- The purpose of this report is to have a clear understanding about data security.

Scope- This report has a wide scope as it will be helpful for the organisation and other people to understand the importance of data security.

Main issues and problems

Some of the common issues that are faced due to data security are:

  • It is difficult to map out that data is used by the valid user and assure that information is accessed by authenticated users only (Patil and Seshadri, 2014).
  • The problem that is faced in data security is making sure that all the data is treated equally, this can be evaluated by data asset valuation process (Farooq, 2017).
  • Security triage is one of the issues as the organisations completely rely for maintaining the security of their sensitive information (Patil and Seshadri, 2014).
  • Higher vulnerabilities of fake data generation.
  • Difficult to map the untrusted users.

Critical analyses of all relevant issues 

According to (Meijer, et. al, 2014), it was found that data security issues are one of the primarily concern of the organisation. Unauthorised access to the information is one of the issues as it allow unauthorised user to read the sensitive information without any permission. This leads to lack of confidentiality as it allows users to access the data without any permission (Oracle, 2017). Other than that, it is observed that data tampering is also increasing. In this data is modified by third party user without any prior information. Some third party users assess the data and modify it before transmitting it (Thota, Manogaran, Lopez and Vijayakumar, 2018).

In the views of (Patil and Seshadri, 2014), lack of accountability is the issues due to which security breaches are increasing. Thus, it is necessary to keep a track and monitor all the operations. This can be done by maintaining an access control list which defines a list of valid user who is allowed to access the data (Thayananthan and Albeshri, 2015). The other issue I observed in the recent years is denial of service in this valid user is not allowed to access the information that causes lack of availability.

According to (Huang,  Liu, Mao, Chen and Li, 2017), to protect the data various cryptography protections are used. Thus, there are various problems that are faced due to cryptographic protection. It slows down the speed due to huge data chunks. The other barrier is data security is data provenance, in this it becomes difficult as some unauthorised users change the metadata which leads to generation of wrong data sets (Thayananthan and Albeshri, 2015). Thus, it becomes difficult to find out the actual information.

It can be stated that, administrators hold all the keys but still hackers can gain unrestricted access. Thus, it is necessary to have a strong access control so that data can be protected and access only by valid user 

 

Recommendation 

It is recommended that, data security can be achieved by encrypting the data. So, that even if data is hacked by the third part user they are not able to read the actual information. Apart from that it is recommended that, backup of data should be maintained. The software and operating system should be updated so that it can discovery all the possible threats and vulnerabilities. The system should make use of firewalls, antiviruses and intrusion detection to protect the data. It is also recommended, that access to information should be allowed to only valid user by making sure that no unauthorised users access the data

Conclusion

From this report, it can be concluded that enterprises should spend money and time for data protection. Data security is the basic need to avoid the financial loss of an organisation and making sure that customer expectations are meet. Data security assures that information remain confidential, integrated and available to only valid user. It is necessary to have a strong data security plan so that all the sensitive information is protected. It is important as now days all the organisation rely on the network for their data. Data security is important as it blocks all the attacks that can be possible due to unauthorised users. It makes sure that no sensitive information is lost. It assures that files are not corrupted or misused from the network. This report helped in having a detail study about the issues and problems that are faced due to data security. 

 

References

Farooq,M.(2017).ACriticalAnalysisontheSecurityConcerns.Available

from https://www.researchgate.net/publication/272488555_A_Critical_Analysis_on_the_Security_Concerns_of_Internet_of_Things_IoT Accessed on 20 aug 2018

Harfoushi, O., Alfawwaz, B., Ghatasheh, N.A., Obiedat, R., Mua’ad, M. and Faris, H (2014). Data security issues and challenges in cloud computing: a conceptual analysis and review. communications and Network, 6(01), p.15.

Huang, Z., Liu, S., Mao, X., Chen, K. and Li, J (2017). Insight of the protection for data security under selective opening attacks. Information Sciences, 412, pp.223-241.

Meijer, H.J.M., Gates III, W.H., Ozzie, R.E., Bergstraesser, T.F., Cheng, L., Connolly, M., Gounares, A.G., Mishra, D.P., Snyder Jr, I.L. and Zaner-Godsey, M., Microsoft Corp (2014). Data security in an off-premise environment. U.S. Patent 8,705,746.

Oracle, (2017). Data Security Challenges. Available from https://docs.oracle.com/cd/B10501_01/network.920/a96582/overview.htm Accessed on 20 aug 2018.

Patil, H.K. and Seshadri, R. (2014). Big data security and privacy issues in healthcare. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 762-765). IEEE.

Thayananthan, V. and Albeshri, A. (2015). Big data security issues based on quantum cryptography and privacy with authentication for mobile data center. Procedia Computer Science, 50, pp.149-156.

Thota, C., Manogaran, G., Lopez, D. and Vijayakumar, V. (2018). Big data security framework for distributed cloud data centers. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 589-607). IGI Global.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Major Issues That Are Faced Due To Data Security. Retrieved from https://myassignmenthelp.com/free-samples/isys326-major-issues-that-are-faced-due-to-data-security.

"Major Issues That Are Faced Due To Data Security." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/isys326-major-issues-that-are-faced-due-to-data-security.

My Assignment Help (2019) Major Issues That Are Faced Due To Data Security [Online]. Available from: https://myassignmenthelp.com/free-samples/isys326-major-issues-that-are-faced-due-to-data-security
[Accessed 07 July 2020].

My Assignment Help. 'Major Issues That Are Faced Due To Data Security' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/isys326-major-issues-that-are-faced-due-to-data-security> accessed 07 July 2020.

My Assignment Help. Major Issues That Are Faced Due To Data Security [Internet]. My Assignment Help. 2019 [cited 07 July 2020]. Available from: https://myassignmenthelp.com/free-samples/isys326-major-issues-that-are-faced-due-to-data-security.


If you have question in your mind like ‘what is a thesis paper’ ask experts from MyAssignmenthelp.com. They will give you a complete guideline on it and also will provide you with some tricks to do an essay efficiently. They can also show you some examples of a thesis which will provide clarity. If you want better benefit than just seeing thesis examples, you can ask our experts to write your thesis paper for you. We have some of the best paraphrasing tools that will scan your paper and make it flawless at the end of the day.

Latest It Write Up Samples

BUS5WB Data Warehousing And Big Data 2

Download : 0 | Pages : 2
  • Course Code: BUS5WB
  • University: La Trobe University
  • Country: Australia

Answer: Agile Data Warehouse Development Creation of data warehouse is multi quarter, monolithic and large effort subject to waterfall process. In modern age, that is no longer norm as several organizations are selecting to adopt more iterative and flexible design approach. With needs of business changing faster as well as new businesses requiring to adapt as well as leverage the inputs rapidly and concisely. Agile development approach is the...

Read More arrow Tags: Australia Bundoora 7 Data Warehousing and Big Data La Trobe University 

ITECH7401 Leadership In IT Project Management

Download : 0 | Pages : 3
  • Course Code: ITECH7401
  • University: Federation University
  • Country: Australia

Answer: Budget Estimate and Financial Analysis The Return on Investment (ROI) is 125.10%, which is higher than the required ROI of twenty-five per cent. Thus, the report concludes that this project will be beneficial Port Fairy Caravan and Camping Park Pty Ltd. Year 0 1 2 3 Total Inflows (Income) 0 90000 130000 150000 370000 Outflows (Expenses) -90000 -2000...

Read More arrow Tags: Australia Riverwood 7 Leadership in IT Project Management Federation University 

MAN6910 Business Process Management

Download : 0 | Pages : 5
  • Course Code: MAN6910
  • University: Edith Cowan University
  • Country: Australia

Answer: Issue register Name of issue Patient waiting too long to register Priority 2 Description When the patients visits the hospital, the new patients are required to be registered first for gaining the treatment in the hospital. Data and assumption Over 20% of the patients who are visiting the hospital are raising the issue of extensive waiting time and longer duration for which treatmen...

Read More arrow Tags: Australia Ashgrove 7 business process management Edith Cowan University 

ITC563 IT Management Issues

Download : 0 | Pages : 10
  • Course Code: ITC563
  • University: Charles Sturt University
  • Country: Australia

Answer: Introduction: In the current aspect the Globex Corporation is a big organization in Australia which has been formed due to the merging of two large regional business which are B T & Sons Farming Equipment and Riverina Precision Farming. Currently, the Globex Corporation is located in three different locations, which are the Albury, Wagga Wagga and Griffith. The Globex Corporation currently handles two types of businesses which are...

Read More arrow Tags: Australia 7 it management issues Charles Sturt University 

ENS2108 Mechanical Science

Download : 0 | Pages : 2
  • Course Code: ENS2108
  • University: Edith Cowan University
  • Country: Australia

Answer: Internet Invention to be commercialized for bringing to the Market Internet is considered as one of the biggest boons of technology and it provides knowledge of technological advancements to its users.  Internet is responsible for providing the most advanced and updated technological products and services to their users. This invention can be commercialized for bringing it to the market by inclusion of different products. One ...

Read More arrow Tags: Australia 7 Mechanical Science Edith Cowan University 
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,356,976

Orders

4.9/5

Overall Rating

5,080

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1758 Order Completed

99% Response Time

William Martinez

MS in Biology

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

265 Order Completed

97% Response Time

Ken Campbell

MSc in Electrical Engineering

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2632 Order Completed

100% Response Time

Albert Ambrosio

MSc in Nursing

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2279 Order Completed

97% Response Time

Zachary Perez

PhD in Computer Science and Information System

Washington, United States

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

I\'m very pleased with my dissertation report. My Assignment Help was very helpful, and they were quick in response to every question asked.

flag

User Id: 364796 - 07 Jul 2020

Australia

student rating student rating student rating student rating student rating

i got a really good grade, im really happy with the resolution i got also the price was very good

flag

User Id: 343054 - 07 Jul 2020

Australia

student rating student rating student rating student rating student rating

Good solution for my statistics final project. It met all the requirements and helped me get a good grade.

flag

User Id: 429802 - 06 Jul 2020

Australia

student rating student rating student rating student rating student rating

Thanks you all for everything. I were in a hard time with getting my assignment done and i really thankful for it.

flag

User Id: 452417 - 06 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?