Free

How to Prevent Illegal Access to Personal Data - Assignment Example

Comments (0) Cite this document
Summary
From the paper “How to Prevent Illegal Access to Personal Data?” it is clear that the problem of creating optimal protecting access to personal data remains relevant. A traditional password system is simple but not reliable, encryption, cryptography, are too complicated for a wide audience…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
How to Prevent Illegal Access to Personal Data
Read TextPreview

Extract of sample "How to Prevent Illegal Access to Personal Data"

To counter illegal access to imperative information, many solutions are available that includes Virtual Private Networks (through tunneling Protocols), Encryption/decryption, RSA (through Public Key Cryptography) etc. but these are too complex to apply at large group of general public.
Keeping in view the above weaknesses of the traditional password system, there is an immense requirement to design an interactive password system as previously done by Tsutomu Matsumoto (1996), Michael K. Reiter (1999), Taekyoung Kwon (2000) and many other great authors of information security. However, some interactive systems were complex, while the others were time-consuming. In order to design an interactive password system, we need to take strings from the user based on several questions rather than a single strong password. Subsequently, we have to use the input strings in a meaningful manner and introduce randomness to develop an interactive password system. Involvement of randomness on the basis of the user’s questions might be easy for the user to remember the answers of the questions; the user will need to remember/keep the answers or rules of the questions rather than keeping a password string. Once the input strings have been taken from the user, in order to further progress the design of the interactive password system, there could be two ways i-e first is to generate password utilizing input string by different cryptography, encryption-decryption, involvement of special characters, mixture of small and capital characters along with numbers, self-generation algorithm as done by William H. Haubert (2002) etc. or the second way could be to generate a rule-based system to create the surreptitious set of rules and regulations, control the rules that would be associated to the users and subsequently, the actual login interface for the said system.
The above design will not allow users to select an easy password like MS Outlook’s Password Management Protocol. As the design is based on an interaction with the user’s secret questions and an involvement of randomness makes it harder for intruders to guess the password as well as for the hacking software.  Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“DQ Week 2 Technology Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1454440-dqweek
(DQ Week 2 Technology Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1454440-dqweek.
“DQ Week 2 Technology Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1454440-dqweek.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF How to Prevent Illegal Access to Personal Data

How the Police Access Data to Obtain Criminal Information

...System (RMS) in California had every piece of personal information of an offender in there state properly indexed and catalogued (Raymond, 2005). So now comes the query that even if a criminal has outstanding warrants and all sorts of records in the state of California, how a trooper retrieved that information on a highway from his car through a wireless radio. The answer to this lies in the Central Justice Information System, National Incident Base Reporting System and Uniform Crime Reporting Program. Now the way the trooper in his car used his radio to gather information about uncle Bobby can just be speculated using the information available to us on the internet. The trooper radioed dispatch and told...
2 Pages(500 words)Assignment

Personal Data Privacy

...where customers are not aware from the pros and cons of providing personal information online. They tend to provide information on unsecure social networking sites and vague online businesses. As a result, they suffer the consequences. This paper will highlight local regulations concerning personal data privacy. Moreover, some implemented counter measures in terms of web site privacy policy and access of law enforcement agencies, privacy on social networking sites, real world security breaches and surveys will be discussed. 2 Data Privacy Survey Findings from the survey include: 45% do not think that banks and online retailers do enough to protect their...
10 Pages(2500 words)Research Paper

Personal Data Protection

...data is very difficult. We have quite common security breaches despite having a wide assortment of technical answers such as personal firewalls, network firewalls, solutions to operating system patching, antiviruses, intrusion detection or prevention systems, anti-spyware, and security management systems. We are not yet able to protect our data because of the fact that we are not ready to take personal responsibility in protecting our data. This is because computer and network security goes beyond simple purchase of gadgets and software for data protection. Personal responsibility for the manner in which...
3 Pages(750 words)Assignment

IT Managers, Data Access and Privacy

...? IT Managers, Data Access and Privacy. Submitted to, Submitted By, of the Submitted on, [February 20th, Data Access and Privacy are two of the most critical issues that govern any organization. With the ongoing rapid advancements in the field of information and communications technology, the issues related to the sanctity of data have become more severe. How they affect the responsibilities of IT managers and their roles has been attempted to be discussed in the report narrated below. Let’s address the core issues of Data Security and Privacy first. Data Security This is a very vast term that is used to denote varying aspect of sanctity associated with data. Formally speaking, “protection of data from unauthorized (accidental... or...
5 Pages(1250 words)Research Paper

Lagal and Illegal Access to Personal Information Online

...? English Essay “Most internet users, both individuals and businesses, underestimate the risks of sharing personal information online. Legal and illegal access to personal information is leading to a huge rise in online and offline crime.” Written By: Table of Contents Introduction 2 Thesis statement 3 Categories of Cyber Crime 3 E-Commerce 4 Social Networking 5 Identity Theft and Hacking 5 Evaluation and Solutions for E-Commerce & Social Networking 6 References 8 Introduction We live in an era which is rapidly getting transformed into a cyber-world. Here, we get to do an array of things using a computer and a network, ranging from business to entertainment, filling the...
7 Pages(1750 words)Essay

How to prevent identity theft

...wrongfully obtains and makes use of personal data of that other person in some way involving deception typically for personal, economic gains (National Crime Prevention Council, 2005). Research has shown that by 2004, there were on average twenty million incidents involving identity theft in the U.S alone (Joseph, 2005). How this happens with all the securities in place, is a question everyone would want to know its exact answer. However, according to a study that was released by two research bodies (Better Business Bureau and Javelin Strategy), in early January 2005, most of the theft do take place offline, which is quite opposite of...
4 Pages(1000 words)Speech or Presentation

How Can the Photographers Prevent Illegal Publishing of Their Phostos In the Internet

...commercial use of it. It is difficult to prevent publishing of images illegally and policing each and every user, therefore, one should be ready to “go to war”. Besides these, some of the proven methods of protecting the photos from stealing, once published online will also be listed. For instance, a few of them are cited below: Shrink wrapping – Usually means that a person is putting a transparent image over the picture. Once somebody downloads it, he or she will get a picture of nothing Right click disable – A common tool which is used by many websites. This option disables the right click menu, which contains the ‘Save image as’ option. One drawback with this option is that the...
11 Pages(2750 words)Essay

Persuasive paper: How to prevent greenhouse effect

...GREENHOUSE The current report deals with the greenhouse effect, how it is caused, and how it can be prevented. The problems of the greenhouse effectand global warming that have led to changing society are fairly new in the scope of history, having its beginnings in the industrial revolution, but the effects have been profound and disturbing. As too much carbon dioxide enters the atmosphere from traditional energy sources, and as traditional products like computers and automobiles leave behind toxic materials, people start exploring more environmentally friendly options in their choice of consuming. People want to feel that they are not inherently linked with depleting the environment to...
5 Pages(1250 words)Essay

Data & Access Management

...Data Access and Management Data Access and Management Introduction Data security management has attracted a lot of deliberation atthe macro level. The common topics are virtualization, data slicing and concerns circumventing the public versus public clouds. Presently, firewalls and security the results from data management is also an essential aspect of such discussion. A firewall has traditionally been employed in the provision of a distinguished obstacle that has never been breached. The data access and management has been on the rise to answer the typical questions raised when the...
6 Pages(1500 words)Essay

Patient access, data mining and PHI

...Patient Access, Data Mining and PHI Patient Access, Data Mining and PHI Health information technology is one of the best initiatives to improve quality and efficiency in the healthcare system. However, its implementation faces some problems with patients and physicians. The goal of implementing the new system was to minimize errors to provide quality services and to address the fragmentation of medical care. The physicians face the problem through the system being complex and cost a lot to implement. The cost may include enabling old facilities to have the wireless networks. Another problem is the encryption of the data and security of the patients’...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic How to Prevent Illegal Access to Personal Data for FREE!

Contact Us