Data security is a way to protect the sensitive and confidential data stored over the digital network. Data security assures that no unauthorised user is allowed to access the data. In short it can be stated, that data security is used to protect the data from being breached. It is every important to undertake data security measures so that data is accessed only by valid user (Harfoushi, et. al, 2014). In this report, a detail description about the overview of the project and its scope is defined. This report also covers the major issues that are faced due to data security.
Purpose- The purpose of this report is to have a clear understanding about data security.
Scope- This report has a wide scope as it will be helpful for the organisation and other people to understand the importance of data security.
Some of the common issues that are faced due to data security are:
According to (Meijer, et. al, 2014), it was found that data security issues are one of the primarily concern of the organisation. Unauthorised access to the information is one of the issues as it allow unauthorised user to read the sensitive information without any permission. This leads to lack of confidentiality as it allows users to access the data without any permission (Oracle, 2017). Other than that, it is observed that data tampering is also increasing. In this data is modified by third party user without any prior information. Some third party users assess the data and modify it before transmitting it (Thota, Manogaran, Lopez and Vijayakumar, 2018).
In the views of (Patil and Seshadri, 2014), lack of accountability is the issues due to which security breaches are increasing. Thus, it is necessary to keep a track and monitor all the operations. This can be done by maintaining an access control list which defines a list of valid user who is allowed to access the data (Thayananthan and Albeshri, 2015). The other issue I observed in the recent years is denial of service in this valid user is not allowed to access the information that causes lack of availability.
According to (Huang, Liu, Mao, Chen and Li, 2017), to protect the data various cryptography protections are used. Thus, there are various problems that are faced due to cryptographic protection. It slows down the speed due to huge data chunks. The other barrier is data security is data provenance, in this it becomes difficult as some unauthorised users change the metadata which leads to generation of wrong data sets (Thayananthan and Albeshri, 2015). Thus, it becomes difficult to find out the actual information.
It can be stated that, administrators hold all the keys but still hackers can gain unrestricted access. Thus, it is necessary to have a strong access control so that data can be protected and access only by valid user
It is recommended that, data security can be achieved by encrypting the data. So, that even if data is hacked by the third part user they are not able to read the actual information. Apart from that it is recommended that, backup of data should be maintained. The software and operating system should be updated so that it can discovery all the possible threats and vulnerabilities. The system should make use of firewalls, antiviruses and intrusion detection to protect the data. It is also recommended, that access to information should be allowed to only valid user by making sure that no unauthorised users access the data
From this report, it can be concluded that enterprises should spend money and time for data protection. Data security is the basic need to avoid the financial loss of an organisation and making sure that customer expectations are meet. Data security assures that information remain confidential, integrated and available to only valid user. It is necessary to have a strong data security plan so that all the sensitive information is protected. It is important as now days all the organisation rely on the network for their data. Data security is important as it blocks all the attacks that can be possible due to unauthorised users. It makes sure that no sensitive information is lost. It assures that files are not corrupted or misused from the network. This report helped in having a detail study about the issues and problems that are faced due to data security.
from https://www.researchgate.net/publication/272488555_A_Critical_Analysis_on_the_Security_Concerns_of_Internet_of_Things_IoT Accessed on 20 aug 2018
Harfoushi, O., Alfawwaz, B., Ghatasheh, N.A., Obiedat, R., Mua’ad, M. and Faris, H (2014). Data security issues and challenges in cloud computing: a conceptual analysis and review. communications and Network, 6(01), p.15.
Huang, Z., Liu, S., Mao, X., Chen, K. and Li, J (2017). Insight of the protection for data security under selective opening attacks. Information Sciences, 412, pp.223-241.
Meijer, H.J.M., Gates III, W.H., Ozzie, R.E., Bergstraesser, T.F., Cheng, L., Connolly, M., Gounares, A.G., Mishra, D.P., Snyder Jr, I.L. and Zaner-Godsey, M., Microsoft Corp (2014). Data security in an off-premise environment. U.S. Patent 8,705,746.
Oracle, (2017). Data Security Challenges. Available from https://docs.oracle.com/cd/B10501_01/network.920/a96582/overview.htm Accessed on 20 aug 2018.
Patil, H.K. and Seshadri, R. (2014). Big data security and privacy issues in healthcare. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 762-765). IEEE.
Thayananthan, V. and Albeshri, A. (2015). Big data security issues based on quantum cryptography and privacy with authentication for mobile data center. Procedia Computer Science, 50, pp.149-156.
Thota, C., Manogaran, G., Lopez, D. and Vijayakumar, V. (2018). Big data security framework for distributed cloud data centers. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 589-607). IGI Global.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2019). Major Issues That Are Faced Due To Data Security. Retrieved from https://myassignmenthelp.com/free-samples/isys326-major-issues-that-are-faced-due-to-data-security.
"Major Issues That Are Faced Due To Data Security." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/isys326-major-issues-that-are-faced-due-to-data-security.
My Assignment Help (2019) Major Issues That Are Faced Due To Data Security [Online]. Available from: https://myassignmenthelp.com/free-samples/isys326-major-issues-that-are-faced-due-to-data-security
[Accessed 24 January 2020].
My Assignment Help. 'Major Issues That Are Faced Due To Data Security' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/isys326-major-issues-that-are-faced-due-to-data-security> accessed 24 January 2020.
My Assignment Help. Major Issues That Are Faced Due To Data Security [Internet]. My Assignment Help. 2019 [cited 24 January 2020]. Available from: https://myassignmenthelp.com/free-samples/isys326-major-issues-that-are-faced-due-to-data-security.
If you have question in your mind like ‘what is a thesis paper’ ask experts from MyAssignmenthelp.com. They will give you a complete guideline on it and also will provide you with some tricks to do an essay efficiently. They can also show you some examples of a thesis which will provide clarity. If you want better benefit than just seeing thesis examples, you can ask our experts to write your thesis paper for you. We have some of the best paraphrasing tools that will scan your paper and make it flawless at the end of the day.
Answer: Background of the study: Maria’s aquariums was originally founded and set up by Maria Picastore who was an aquarium and fish enthusiast and gradually with time, her hobby in fishes turned out to be a business when people started purchasing the exotic hybrid fishes that she used to produce. Gradually the business expanded and she started selling other aquarium supplies from the retial stores that she had started in Chatswood, Wollo...Read More
Answer: Introduction The nano server in the windows is a new and improved server by windows. It provides user the option through which it is possible to install the windows server with the windows footprint that is possibly the lowest. The footprint is even smaller if compared to the server core. This is made possible through a smart technique that is controlled very efficiently . In order to achieve this, the operating system is ref...Read More
Answer: Introduction In recent times it can be stated that most of the organisation directly rely on the functionality which is related to the process which is related to the process architecture is directly related to the business operation. The main concept which can be applied to the concept is that most of the complex and large projects are manipulated by the concept of the process architecture. The main functionality in this context can ...Read More
Answer: Introduction In this report, the discussion is going to be done on the strategic information system of Westpac bank. Westpac bank is among the four major banks of Australia, with the headquarters located in the Sydney. The westpac bank has divided in two segments, bank associated with the institution and the bank associated with consumer. Not only in Australia, Westpac bank holds a good rank in New Zealand. The bank had formed a...Read More
Answers: 1: CIA of information security is commonly described as the triad of information security. Confidentiality, Integrity and Availability are denoted by the term CIA. It is a model of information security that helps in evaluating organisation’s information security. Confidentiality is defined as ensuring authorized person is accessing data. Unauthorised access should be blocked to ensure information security. Disclosure of importa...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
It was a good assignment. Keep it up. Hope that you maintain same standards in the future.
The work was on time but it was not satisfactory as there was no appendix and scored fewer marks of what I was expecting.
Extremely happy with the assessment . Would like to Tudor again on other assignment\'s, the excellent wording , and no mistakes , also the correct use of language. Definitely want the same Tudor for other assignments . 5 Stars . Thank You for the gr...
I have a very good experience with assignment help. In last semester i will take help for many assignments. I got very good grades from these assignments. Now, this semester I will take help from them in many assignments. The price of the assignments...