$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

ISYS326-Major Issues That Are Faced Due To Data Security

tag 0 Download5 Pages 1,080 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


You are required to prepare a report based on your collected paper on Data Security. Your report must be supported by references through additional readings. Your active participation in the class will also be taken into account & may be assessed (only for on campus students).



Data security is a way to protect the sensitive and confidential data stored over the digital network. Data security assures that no unauthorised user is allowed to access the data. In short it can be stated, that data security is used to protect the data from being breached. It is every important to undertake data security measures so that data is accessed only by valid user (Harfoushi, et. al, 2014). In this report, a detail description about the overview of the project and its scope is defined. This report also covers the major issues that are faced due to data security.

Purpose- The purpose of this report is to have a clear understanding about data security.

Scope- This report has a wide scope as it will be helpful for the organisation and other people to understand the importance of data security.

Main issues and problems

Some of the common issues that are faced due to data security are:

  • It is difficult to map out that data is used by the valid user and assure that information is accessed by authenticated users only (Patil and Seshadri, 2014).
  • The problem that is faced in data security is making sure that all the data is treated equally, this can be evaluated by data asset valuation process (Farooq, 2017).
  • Security triage is one of the issues as the organisations completely rely for maintaining the security of their sensitive information (Patil and Seshadri, 2014).
  • Higher vulnerabilities of fake data generation.
  • Difficult to map the untrusted users.

Critical analyses of all relevant issues 

According to (Meijer, et. al, 2014), it was found that data security issues are one of the primarily concern of the organisation. Unauthorised access to the information is one of the issues as it allow unauthorised user to read the sensitive information without any permission. This leads to lack of confidentiality as it allows users to access the data without any permission (Oracle, 2017). Other than that, it is observed that data tampering is also increasing. In this data is modified by third party user without any prior information. Some third party users assess the data and modify it before transmitting it (Thota, Manogaran, Lopez and Vijayakumar, 2018).

In the views of (Patil and Seshadri, 2014), lack of accountability is the issues due to which security breaches are increasing. Thus, it is necessary to keep a track and monitor all the operations. This can be done by maintaining an access control list which defines a list of valid user who is allowed to access the data (Thayananthan and Albeshri, 2015). The other issue I observed in the recent years is denial of service in this valid user is not allowed to access the information that causes lack of availability.

According to (Huang,  Liu, Mao, Chen and Li, 2017), to protect the data various cryptography protections are used. Thus, there are various problems that are faced due to cryptographic protection. It slows down the speed due to huge data chunks. The other barrier is data security is data provenance, in this it becomes difficult as some unauthorised users change the metadata which leads to generation of wrong data sets (Thayananthan and Albeshri, 2015). Thus, it becomes difficult to find out the actual information.

It can be stated that, administrators hold all the keys but still hackers can gain unrestricted access. Thus, it is necessary to have a strong access control so that data can be protected and access only by valid user 



It is recommended that, data security can be achieved by encrypting the data. So, that even if data is hacked by the third part user they are not able to read the actual information. Apart from that it is recommended that, backup of data should be maintained. The software and operating system should be updated so that it can discovery all the possible threats and vulnerabilities. The system should make use of firewalls, antiviruses and intrusion detection to protect the data. It is also recommended, that access to information should be allowed to only valid user by making sure that no unauthorised users access the data


From this report, it can be concluded that enterprises should spend money and time for data protection. Data security is the basic need to avoid the financial loss of an organisation and making sure that customer expectations are meet. Data security assures that information remain confidential, integrated and available to only valid user. It is necessary to have a strong data security plan so that all the sensitive information is protected. It is important as now days all the organisation rely on the network for their data. Data security is important as it blocks all the attacks that can be possible due to unauthorised users. It makes sure that no sensitive information is lost. It assures that files are not corrupted or misused from the network. This report helped in having a detail study about the issues and problems that are faced due to data security. 




from Accessed on 20 aug 2018

Harfoushi, O., Alfawwaz, B., Ghatasheh, N.A., Obiedat, R., Mua’ad, M. and Faris, H (2014). Data security issues and challenges in cloud computing: a conceptual analysis and review. communications and Network, 6(01), p.15.

Huang, Z., Liu, S., Mao, X., Chen, K. and Li, J (2017). Insight of the protection for data security under selective opening attacks. Information Sciences, 412, pp.223-241.

Meijer, H.J.M., Gates III, W.H., Ozzie, R.E., Bergstraesser, T.F., Cheng, L., Connolly, M., Gounares, A.G., Mishra, D.P., Snyder Jr, I.L. and Zaner-Godsey, M., Microsoft Corp (2014). Data security in an off-premise environment. U.S. Patent 8,705,746.

Oracle, (2017). Data Security Challenges. Available from Accessed on 20 aug 2018.

Patil, H.K. and Seshadri, R. (2014). Big data security and privacy issues in healthcare. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 762-765). IEEE.

Thayananthan, V. and Albeshri, A. (2015). Big data security issues based on quantum cryptography and privacy with authentication for mobile data center. Procedia Computer Science, 50, pp.149-156.

Thota, C., Manogaran, G., Lopez, D. and Vijayakumar, V. (2018). Big data security framework for distributed cloud data centers. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 589-607). IGI Global.


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Major Issues That Are Faced Due To Data Security. Retrieved from

"Major Issues That Are Faced Due To Data Security." My Assignment Help, 2019,

My Assignment Help (2019) Major Issues That Are Faced Due To Data Security [Online]. Available from:
[Accessed 24 January 2020].

My Assignment Help. 'Major Issues That Are Faced Due To Data Security' (My Assignment Help, 2019) <> accessed 24 January 2020.

My Assignment Help. Major Issues That Are Faced Due To Data Security [Internet]. My Assignment Help. 2019 [cited 24 January 2020]. Available from:

If you have question in your mind like ‘what is a thesis paper’ ask experts from They will give you a complete guideline on it and also will provide you with some tricks to do an essay efficiently. They can also show you some examples of a thesis which will provide clarity. If you want better benefit than just seeing thesis examples, you can ask our experts to write your thesis paper for you. We have some of the best paraphrasing tools that will scan your paper and make it flawless at the end of the day.

Latest It Write Up Samples

INFT6500 Accounting Information Systems 3

Download : 0 | Pages : 13
  • Course Code: INFT6500
  • University: Newcastle University
  • Country: United Kingdom

Answer: Background of the study: Maria’s aquariums was originally founded and set up by Maria Picastore who was an aquarium and fish enthusiast and gradually with time, her hobby in fishes turned out to be a business when people started purchasing the exotic hybrid fishes that she used to produce. Gradually the business expanded and she started selling other aquarium supplies from the retial stores that she had started in Chatswood, Wollo...

Read More arrow

BN206-Review Administration Systems

Download : 0 | Pages : 4

Answer: Introduction  The nano server in the windows is a new and improved server by windows. It provides user the option through which it is possible to install the windows server with the windows footprint that is possibly the lowest. The footprint is even smaller if compared to the server core. This is made possible through a smart technique that is controlled very efficiently [1]. In order to achieve this, the operating system is ref...

Read More arrow

ITECH5404-Business Process Architecture

Download : 0 | Pages : 8
  • Course Code: ITECH 5404
  • University: Federation University
  • Country: Australia

Answer: Introduction In recent times it can be stated that most of the organisation directly rely on the functionality which is related to the process which is related to the process architecture is directly related to the business operation. The main concept which can be applied to the concept is that most of the complex and large projects are manipulated by the concept of the process architecture. The main functionality in this context can ...

Read More arrow

HI5019-Strategic Information System- Westpac Bank

Download : 0 | Pages : 14

Answer: Introduction In this report, the discussion is going to be done on the strategic information system of Westpac bank. Westpac bank is among the four major banks of Australia, with the headquarters located in the Sydney.  The westpac bank has divided in two segments, bank associated with the institution and the bank associated with consumer. Not only in Australia, Westpac bank holds a good rank in New Zealand. The bank had formed a...

Read More arrow

CIS2005 Principles Of Information Security 3

Download : 0 | Pages : 11

Answers: 1: CIA of information security is commonly described as the triad of information security. Confidentiality, Integrity and Availability are denoted by the term CIA. It is a model of information security that helps in evaluating organisation’s information security. Confidentiality is defined as ensuring authorized person is accessing data. Unauthorised access should be blocked to ensure information security. Disclosure of importa...

Read More arrow

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

610 Order Completed

100% Response Time

Cheryl Zhao

PhD in Statistics

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

230 Order Completed

97% Response Time

Liya Han

Master Of Science in Geotechnical Engineering (MSc Geotec)

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

798 Order Completed

97% Response Time

Benjamin Blakeman

MSc in Medical Technology

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

It was a good assignment. Keep it up. Hope that you maintain same standards in the future.


User Id: 261408 - 24 Jan 2020


student rating student rating student rating student rating student rating

The work was on time but it was not satisfactory as there was no appendix and scored fewer marks of what I was expecting.


User Id: 197563 - 24 Jan 2020


student rating student rating student rating student rating student rating

Extremely happy with the assessment . Would like to Tudor again on other assignment\'s, the excellent wording , and no mistakes , also the correct use of language. Definitely want the same Tudor for other assignments . 5 Stars . Thank You for the gr...


User Id: 226024 - 24 Jan 2020


student rating student rating student rating student rating student rating

I have a very good experience with assignment help. In last semester i will take help for many assignments. I got very good grades from these assignments. Now, this semester I will take help from them in many assignments. The price of the assignments...


User Id: 270427 - 24 Jan 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?