StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Data Privacy and Security - Research Paper Example

Cite this document
Summary
The research paper 'Data Privacy and Security' demonstrates that cybercrime is any felony that is committed using a computer or any other computer-related device for example the internet. It spans from cyber fraud activities to a simple act like downloading a music file from the internet. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Data Privacy and Security
Read Text Preview

Extract of sample "Data Privacy and Security"

?Research survey Number Introduction Cyber crime is any felony that is commited using a computer or any other computer relateddevice for example the internet. It spans from cyber fraud activities to a simple act like downloading a music file from the internet. It also include activities like creating a program that will create disturbances to the users of a particular group of computers and also posting text and pictures on the websites that will corrupt the minds of some individuals. When somebody information of a company that is suppose to be confidential is also considered as a cybercrime. There are very many cyber crime that can be commited using the computer or with the aid of a computer. The most appropriate way to look at it in detail is identifying them by the types and level of cyber attacks.Cyber attacks are a deliberate or unintentional unauthorized task, which cannot be avoided or is in avoidable that that is capable of causing a vagary on the cyberspace resources. The scope of cyber attack is expands from hardware, software, data that is stored, data in transit, people, documents and other hardware needed like printer cartridges. Scope of the problem The different types of attack that amount to cyber crime and are detriment to cyber security are keylogging and spyware. This is a malware that is built to illegally obtain, track and block the right of a user to get access to the system. An example of this attack is where someone or an individual tries to log on to the system or a website like an email account but the system or the site fails to authenticate the user. To prevent this system administrators should establish a mechanism where if the user complaints of such issue the system should prompt the user by asking some questions relating to the account. The second attack is backdoor or command/control. These are weapons that give remote access that are created to divert the functionality of the system. The other attack is SQL injection. This is a unique attack that targets the web pages of the system application. It cuts down the communication between the database and the system application interface. This attack is common in organization where system implementation is taking place. An example is a situation where an attacker alters the name of the database and hence disconnects it from the user interface. The best measure that can be used to curb this is by limiting the number of the people who has the right to manipulate the database activates and also the punishment that individual that uses a computer to physically hurt another person or tries to commit a felony with an aid of a computer is made severe. There was also a provision of extensive security to media group that gave hand to the police while carrying out the investigation while the vulnerable attacks that were frequent were blacklisted so that more security concern were availed in those areas (Middleton, 2005). Another attack that is very rampant is abuse of system access rights. This kind of attack is mostly executed by the employees in a company in and intention of vengeance or sabotage. Detecting such issue is cumbersome since the intrusion will be taking place internally and hence task tracking may be a challenge. The employees use his or her right to access the system to make alteration and modification of data with the intension of financial gains for example in an employee in the IT department of a water providing company can reduce the consumption figures of some specific accounts then liaise with the holders of those accounts for payment. To combat all frauds that are related to inappropriate billing, the people that are authorized to enter the company’s data concerning the customers must exercise the professional ethics to the fullest. Individual that are given this assignment must have the appropriate integrity basing on the previous records. A body that vets such individual should be established. Such a body should be external and should randomly do the auditing to ensure that the way the vetted individuals execute their duties do not deteriorate with time. In addition, a rotational exercise should be in place to stop these individuals from getting acquainted with other employees in other departments and hence conspiracy is avoided. To stop this kind of digital attack, the company should put in place a tracking system which will compare each consumption figure with the average of the previous five or more months and hence gives an approximate value. In addition, the data security manager should utilize the advantages that the windows active directory has. The Microsoft windows group policy is applied in grouping the different categories of users that are suppose to get access to some particular information. It is a key component that gives specific setups for particular group of users. Another type of attack that that mostly affects the system users who gives commonly known username and password as default credential is unauthorized access via default credential. A good example of this is where the system administrator in an institution put the name of the college as both username and password. This is very vulnerable to attackers because they capitalized the idea of using the default credentials that are related to the institution such as setting the password of accessing the wireless network of Aberdeen College as aberdeencollege. Anyone who knows come within the coverage and has the intention of cracking this password can succeed. To avoid this, the default credential should be unique as in; it should not be related to the name of the institution or the company (Wall, 2009). The other attack is the violation of acceptable system user policies. In some companies, the system once logged in by the user will remain on till logged out. A user can negligently abandon the system while logged in and go out, this can give an opportunity to unauthorized person to access the system and facilitate any harmful event like altering the data with the intention of causing an embarrassment to the company or the owner. An example of this is where somebody forgets to log from his email account and another person comes and send abusive or vulgar mails to some group of people. This can be detriment to the user’s attribute because everybody believes that the message comes from the rightful owner of the account. To eliminate this attack, everybody should be careful while using such system by ensuring that the log out process has been affected anytime you can to quit from using the system. Illegal access to the system via weak ACLs or wrong configuration of an ACL. This gives a loop hole to attackers to get access to the system and perform destructive task that can hinder the operation of a system or event can result to complete denial of services. The measure that can be used to prevent this is basically ensuring that all access control are strongly and rightly configured and in case of any incident of attack, the punishment that individual that tries to commit a felony with an aid of a via this attack is made severe. There was also a provision of extensive security to media group that gave hand to the police while carrying out the investigation while the vulnerable attacks that were frequent were blacklisted so that more security concern were availed in those areas (Middleton, 2005). Another attack that mostly affects the data and information on transit is packet sniffing where the attacker tracks the data in the network and collect it. He can modify this data and send wrong data to the recipient or can divert the data causing denial of service. A situation where by the policy information or business transaction information of a company that is suppose to reach the stakeholders are redirected and send to the competing firm is a very good illustration. This can compromise data and information security in their business system in terms of confidentiality, integrity and availability. Information confidentiality enables the organization’s sensitive information to be a secret so that it does not fall into the hands of unauthorized persons for example the competitors. Information integrity ensures that the data that is stored is accurate and serves the purpose and is always up to date. Data availability enables information to be present any time the organization required. This is by preventing any vulnerability for example denial of service. This can give the competitor firm an avenue of bringing down the company by capitalizing on the weakness of the other company and at the same time enhancing its strength (Rosenberg, 2006). The key way of ensuring security of data and information on transit is making sure that the laid networks devices are protected from any vulnerable attack like theft since breakdown in the physical network setup weakness give an opportunity to attackers. Ensuring that the intellectual property is secured is a significant factor. This is by using VPN and secure sockets layers to ensure data confidentiality, integrity and non-repudiation (Trevor, 2011) Credential theft. This is where somebody’suser name and password is stolen and used to gain unauthorized access to the system by pretending to be the owner of those credential details. An example is where robbers takes the visa card of and individual and demands for the credential. They will then use this to withdraw cash from the ATM machines. Another example is where an employee in a bank steal his fellow employee’s username and password then use it to access the system then make fund transfer. The owner of that credentials will suffer without knowing the culprit since this attack also originate from inside the organization and hence difficult to detect. One method of combating this cyber attack is by use of built-in fingerprint scanners that are integrated in the ATM machine. This has the ability to learn the user’s fingerprint so that anytime you need to log in, you identify yourself by placing you finger on the scanner and the laptop boots. In addition, some laptops have veriface. This software has the ability to recognizing the authorized user’s face (Salomon, 2007). Social engineering is another attack that is more complicated since its origin is from the innocent person. This is a technique where the person is tricked into performing a computer operation that is harmful. The culprit can seduce the user for exampling telling him or her benefit that the person will get when he does such an activity. This method is mostly used by competitor firms where they convince the employee of the other competing firm to disclose information that is suppose to the top secret of the company. To stop this attack, employees in a company should be educated on the awareness of suck attackers and also significant of exercise the professional ethics to the fullest. Individual that are given this assignment must have the appropriate integrity basing on the previous records. A body that vets such individual should be established. Such a body should be external and should randomly do the auditing to ensure that the way the vetted individuals execute their duties do not deteriorate with time. In addition, a rotational exercise should be in place to stop these individuals from getting acquainted with other employees in other departments and hence conspiracy is stopped. The other attack is brute-force attack where someone with an intention of hacking the system tries a large number of usernames and passwords till he get the correct one. In addition, there software that is able to calculate the password by iterating through a very large database of credential details to come up with the correct password. Some attackers have universal password which crack all other passwords (Rittinghouse,2009). Proxy authorship is the best way to curb the risk. Once individual identity details are recorded and well documented, he/she will fear to engage in any fraudulent activity because tracking can be done in case of any fraud. Any employee that uses the system must log on using a user name and password that expires every two weeks and should be renewed by making a request so that the administrator is aware. To stop this attack, the system developers should limit the number of attempt that one can enter the password before the system completely block. This can be enabled by using the GPO in the active directory where the system block by either redirecting the user interface of the system or completely hide. It can also make the form inactive or ask for verification using related questions Some attacker uses authentication bypass methods where he or she can get access to the system without having to enter the credentials in order to authenticate him/her. This can be through a different IP address that routes the attacker via other links until he get access to the same system. Although this method is very hard to completely eliminate, its vulnerability can be stopped by use of firewall to filter the information that is outsourced to the public domain. Use of firewall is also necessary because there are some information that are supposed to be know by the management only hence the information that the other employees get should be filtered. In their network, there should be two firewalls: enterprise firewall and DMZ firewall that are used to facilitate data confidentiality by filtering the information that the some employee’s access. Physical theft of assets such as software, hardware and networking devices is another attack that can lead to denial of service. An example of this is where the network cables of a certain internet providing company are stolen every forth night. This resulted into the clients switching to the competing service provider. It was later realized that the loss of network cables were aided by the other competing company. The only way this can be stopped is by ensuring physical security of the laid network devices are protected from any attack like theft since breakdown in the physical network setup leads to denial of service. There is another new form of attack called ram scraper, this is a program or virus that targets the data that is contained in the ram with the intention of modifying it before being processed and completely deleting it. This form of attack can be prevented by use of very powerful antivirus which can disintegrate the program. In addition, this malware are transferred via the internet therefore any document that is downloaded from the internet must be scanned for virus. Phishing is another form of social engineering which the attacker makes use of electronic communication to convince the person whom he is communicating to give the information that is supposed to be an intellectual property of the company. An example is where fraudster lures somebody to invest in business that does not exist with intention of defrauding that person in terms of finance. It can be eliminated by having in place the system that is records the identity details of that person so that tracking can be facilitated Attack on cars-the computerized devices that the car uses can be disabled by an attacking program. An example is where the driver’s input is ignored for example disabling brakes and stopping the engine. Can be stop by protecting the code not to get into the hands of unauthorized people. Social network attacks-this are virus and Trojan horses that takes one identity information. The latest are the ones that navigate the whole social network with the intention of obtaining and sending your social live information and hence expose to risk of social network-based pests. This risk can be eliminated using high level of proxy authorship. Webcam hacking-this are Trojan program that can run the webcam in the laptop. It will take photos and videos of the user and send via internet. Example is where VIP private life activities are exposed without his knowledge via this attack. To eliminate this, the webcam should have a shutter. Medical device attacks- this is where the culprit send an attacking code that hinders the functionality of life saving devices. For example sending a program that will disable the ICU equipments in a hospital. This attack can be prevented by ensuring that the code for embedded software that run these devices are kept as intellectual; property. The other attack is the one that targets the iPhones and cell phones that uses adroid operating system including VOIP. The attacker capitalizes on the weaknesses of having to zip the content of the program to enable it to be accommodated by the small memory. This is because the program neglects some coding that though not a must is needed to ensure maximum security of the data. (Cardwell, 2007). To eliminate this attack the developers of android application programs and operating system should include the usability component of ensuring security of the information since it can be adverse to the business. This can be facilitated through PGP. This is a mechanism that ensures security by splitting the text that is send to the devices that have limited memory and implementing the appropriate cryptography. Conclussion Basing on the rate at which the technology is evolving, the future of cyber crime is unpredictable. This is because the people who engage themselves in ccyber crime are also proffessionals in the field who could be having the intension to cause harm or could be some who are trying to text their prowess in technology and as a result execute a felony. In general, the best way to combat the whole thing is by ensuring that everybody who interacts with the computer becomes concious and also practices the proffessional ethics. The recommendation that I give concerning the security issues that are brought about by all the cyber related issues is that any weakness that can give the attackers a room to get access to any computer or internet-based materials should not be left. In addition, severe punishment should be put in place for anybody that is convicted with any cyber crime activity so that the others may fear to engage on it. In addition, any other party that handles any internet related information that is meant to be used at anyeventshoould be vigilant because some of the employees in these places conspire with the attackers in accomplishing the attacks. This can be done by applying group policy settings in the computers that those users that do not need to get access to such sensitive information are locked out (Johnson, 2005) The last layer of the group policy object is used by the administrator to lock down the computers that those particular users operate by applying policy setting to each user. The properties of multiple local group objects are derived from the processing order. The processing order of the three layers differs. The third layer contains specific user settings that are set to one user on a computer that he/she uses. One way of ensuring this setting is by redirecting the desktop components that you do not want those specific users to get access. The other way of doing this is by redirecting the start menu and giving the computer a different start menu for example that of windows 9x/NT. Moreover, the investigation department that deals specifically with cyber crime should be established and all the laws and regulation governing the cyber crime must be redefined such that any sign of cyber related crime is punished (Cross, & Shinder, 2008). References Middleton, B. (2005). Cybercrime investigator's field guide. Auerbach Publications. Ransome, J., & Rittinghouse, J. (2009). VoIP security. Digital Press. Rosenberg, R. S. (2006). The social impact of computers. Emerald Group Publishing. Salomon, D. (2007). Data privacy and security. Springer. Trevor, J. (2011). Cyber Attack: Improving Prevention and Prosecution" Hearing Before the Subcommittee on Technology, Terrorism. General Books. Wiles, J., & Cardwell, K. (2007). The best damn cybercrime and digital forensics book period. Syngress. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research survey Coursework Example | Topics and Well Written Essays - 3000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1397417-research-survey
(Research Survey Coursework Example | Topics and Well Written Essays - 3000 Words)
https://studentshare.org/information-technology/1397417-research-survey.
“Research Survey Coursework Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/information-technology/1397417-research-survey.
  • Cited: 0 times

CHECK THESE SAMPLES OF Data Privacy and Security

Customer Relationship Management

It is, therefore, important that the company maintain both Data Privacy and Security.... Customers mainly trust those companies that they believe maintain a high degree of privacy and security of their information.... The questions below will be addressed in the succeeding discussions: What the differences between privacy and data security?... The differences between privacy and data security are important in handling customer information....
3 Pages (750 words) Essay

Data Protection Laws, Regulations, and Policies

The Personal Data Privacy and Security Act of 2009 The Personal Data Privacy and Security Act is the other Act that addresses data protection in the United States of America.... Just like the Personal Data Privacy and Security Act of 2009, the Massachusetts's 201 CMR 17.... Among these policies are Sarbanes-Oxley Act [SOX], Data Protection Act, Federal Information security Management Act [FISMA], California security Breach (SB) Information Act, Massachusetts 201 CMR 17....
3 Pages (750 words) Essay

Using Gadgets at Work

Data Privacy and Security.... There are two security concerns that a business may have with employees that communicate outside a network.... nother critical issue concerns with the aspect of data integrity (Salomon, 2003).... In data integrity, the same should not be modified in an undetectable way.... The breach of integrity occurs when another force modifies data during its transit.... Users can attain harm on the breach of data....
1 Pages (250 words) Essay

Internet Sharing of Files, and HIPAA Regulations

Legal issues and resolutions surrounding internet sharing of files, HIPAA, and PACS revolve around safeguarding Data Privacy and Security.... All healthcare practitioners are responsible for adhering to HIPAA privacy and security regulations so as to guarantee that PHI is secured and confidential (Cao, Huang & Zhou, 2003).... Some of issues essential to adhering to HIPAA requirements include restricting access, tracking access, protecting data security, confidentiality, and integrity and sustaining data chain-of-control (Lyer, Levin & Shea, 2006)....
2 Pages (500 words) Research Paper

Cultural and Social Significance of Mobility and Wearable Technology

Vis a vis, the issues of Data Privacy and Security raises concerns over the ownership of the information, third party access rights and sharing of the information to government agencies.... Consequently Ling (2008) noted these technologies have given rise to new concerns of privacy and security.... Vis a vis, the advent of mobility and wearable technology has had profound implications on communication, interpersonal interactions, security and privacy and healthcare services provisions....
2 Pages (500 words) Essay

Admission proposal (Topic Data Mining)

rg is an example of sites that aid data search and its efficiency in availing data is a threat to Data Privacy and Security.... Chesterman, S 2014, Data protection law in Singapore: privacy and sovereignty in an interconnected world, Academy Publishing, Singapore.... 908), the available technique for ensuring privacy of data in data mining was inefficient and destroyed original data.... While ensuring privacy achieved an ethical objective in data use, destroying original data established threats to reliability and validity of availed data....
2 Pages (500 words) Research Proposal

Management Plan in the Case of a Security Breach

In the health sector, it is of crucial significance to note that the protection of The information of such clients should be accorded due protection and security deserved.... It is significant to note that confidentiality of information is important in several aspects of life since it maintains… In addition, information security and confidentiality is important in the protection of the client information.... These rules, policies and regulations should ensure maximum security and confidentiality of the information of such clients....
4 Pages (1000 words) Essay

Internet of Things

However, these processes have to consider the issues of Data Privacy and Security since the internet is considered a delicate medium of data transfer.... The Internet of Things enables the development of these smart entities, which act as a source of the trigger to the development of novel technologies that are most needed in addressing the common challenges emerging in areas of public health, environmental protection/climate change, energy conservation, enhancement of security and enhancement of economic growth among others....
5 Pages (1250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us