StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Technological Advancements, Data and Information Security - Research Paper Example

Cite this document
Summary
The paper "Technological Advancements, Data and Information Security" discusses that augmented connectivity has offered a number of benefits and opportunities however it has as well left businesses increasingly vulnerable to intimidation from outsiders and entities in their corporation. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Technological Advancements, Data and Information Security
Read Text Preview

Extract of sample "Technological Advancements, Data and Information Security"

In dealing with these challenges, business organizations always struggle with how to defend their intellectual property by minimizing the costs and harm to brands that can result from unintended exposure of employee and customer data (Penton Media, Inc., 2012).

Additionally, data and information security have come on top of the list of the main issues that are being faced by information systems executives nowadays. In this scenario, numerous aspects and factors cause serious issues to data and information security. Some of the important aspects that can create serious security issues can include illegal access to a computer or network, storage room, destruction due to fire, flood, earthquake, and hurricane. At the present, a large number of researches are being carried out to determine the ways and suggest solutions to make organizational data information more secure. It is essential to deal with these issues as they can cause customer dissatisfaction or even whole business failure (Loch & Carr, 1992; Penton Media, Inc., 2012; Shulman, 2006). This report presents an analysis of the potential threats to the data and also suggests solutions for them.

One of the major security issues that can cause a serious challenge for data security is excessive privilege abuse. When database or application users are provided access to databases with privileges that go beyond the needs of their working job purpose, in this scenario, these privileges can be used for carrying out illegal tasks. In addition, a given data user ends up with extreme privileges for the simple cause that database administrators do not have the time to describe as well as update rough access privilege control methods for every user (Shulman, 2006).
This problem can be resolved by using various techniques. One of the basic techniques is a username and password-based access. Though it is easy to use in many cases, users forget their passwords, and these passwords are accessed by illegal users. Another solution to deal with this problem is the implementation of effective security measures against the excessive privileges that are established through query-level access control. In this scenario, the query-level access control mechanism will limit database rights to minimum necessary SQL processes (UPDATE, SELECT, etc.) and data. In addition, the granularity of database access control has to expand beyond the table to specific rows of columns in a table (Shulman, 2006).

Another major threat is backup data exposure. This is another most important data security problem that is based on the backup database storage media that is completely unprotected from attack. As an effect, several high-profile and data-related security breaches can happen and any person can illegally access the database backup tapes and hard disks (Ponemon, 2007).
Though username and password-based technique can be used to deal with this issue it is not as much effective (as discussed above). To deal with this issue all data backups have to be encrypted. At the present, there are numerous encryption techniques available. Some of the well-known techniques that can be used for this purpose include public key cryptography and hashing. These techniques are very effective in protecting the data (Ponemon, 2007).

There is another most important issue that can damage the data and information stored in a computer and that is a computer virus. A computer virus is a program that spreads from one file to another so it can be very dangerous for a business. In this way, it can infect all the data and information stored in the computer (Norton, 2001; Shelly, Cashman, & Vermaat, 2005; Turban, Leidner, McLean, & Wetherbe, 2005).

The best solution to this problem is the use of an antivirus program. There are many antivirus software applications available to stop these viruses from entering a system. For instance, Norton antivirus is considered to be an appropriate solution. Additionally, it is believed that care is better than cure so it is essential for businesses and individuals that they regularly update their antivirus programs to fight the latest emerging viruses. An antivirus program stops and removes the viruses entering the system but it must be upgraded regularly. If you do not update the definitions of an antivirus regularly then it will be useless. A firewall can also be effective in dealing with these kinds of issues. But it is not effective for all viruses and threats (Norton, 2001; Shelly, Cashman, & Vermaat, 2005; Turban, Leidner, McLean, & Wetherbe, 2005). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Technology Evaluation and Recommendation Research Paper - 1”, n.d.)
Technology Evaluation and Recommendation Research Paper - 1. Retrieved from https://studentshare.org/information-technology/1463226-technology-evaluation-and-recommendation
(Technology Evaluation and Recommendation Research Paper - 1)
Technology Evaluation and Recommendation Research Paper - 1. https://studentshare.org/information-technology/1463226-technology-evaluation-and-recommendation.
“Technology Evaluation and Recommendation Research Paper - 1”, n.d. https://studentshare.org/information-technology/1463226-technology-evaluation-and-recommendation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Technological Advancements, Data and Information Security

Biometrics: Unseen Aspects

Instead of traditional security systems, society today needs new verification systems to be in use; this is where biometric authentication has gained its relevance.... nother view that supports biometrics is that the principle of network security is least disputed.... Again, the next argument in this phase is also regarding security.... It is a threat to the person's security over his properties.... These issues are not the same as other security measures of personal identification....
4 Pages (1000 words) Assignment

Technological Achievements that Led to FISMA and COPPA

It also requires of them to improve the information security framework that is the plan of how they will improve the networks and finally the act includes a set of directives that govern agencies' security responsibilities and how to adhere to the law (NIST, 2002).... technological advancements that Led to FISMA and COPPA (Name) (University) (Course) (Tutor) Introduction The advances in technology have promised individuals and societies a lot of benefits.... COPPA and technological advancements leading to its creation The second act, the COPPA act in general aims to give parents the control over what information is gathered from their children who are below the age of 13 online....
3 Pages (750 words) Essay

Securing Data Using IPSEC VPN over Satellite Communication

These aspects comprise elaborating the functions of VPN, techniques to be used for securing valuable data and analyzing the facets of VPN over the system of satellite communications.... This reseaerch paper ''Securing Data Using IPSEC VPN over Satellite Communication'' intents how internet protocol security virtual private network (IPSEC VPN) secures the procedure of data transmission over other methods like satellite communication systems; and discusses the various significant....
18 Pages (4500 words) Research Paper

Engineering and Society - Technological Advancements in the Last Decades

The author of the "Engineering and Society - technological advancements in the Last Decades" paper discusses the technological advancements in the last thirty years in the automotive industry and the advancement that will happen in the next thirty years.... technological advancements in the manufacturing industries have also contributed to the advancements in the last thirty years.... The rear-mounted radar is one of the technological advancements in the automotive industry in recent years....
6 Pages (1500 words) Essay

International Security and the State

The increase in cross-border trade, migration, and investments can be said to have been spurred by technological advancements and policies that have been taking place over the years.... 6] These technological advancements make it a lot easier for people to engage in business, to communicate and to travel internationally.... 7] The technological advancements can be attributed to the rise of the internet and the advances in different telecommunication infrastructures....
10 Pages (2500 words) Essay

ACS Trends and Future Technologies

Access control can be defined as the imposition of restrictions to access of places, data and other resources for unauthorized persons (Sandhu et al.... On the other hand, Logical access control restricts access to system files, data and computer networks (Bertino et al.... Technological advancement in-network and software-based solutions are especially important to researchers, and they help improve security in access control systems and other areas....
10 Pages (2500 words) Coursework

Impact of IT on Business

Some of these procedures would call for staff training and implementation of new security measures to protect the interests of all stakeholders.... The paper "Impact of information Technology on Business" is a worthy example of a term paper on business.... Both small and big businesses have undergone a revolution by embracing the continuous information technology advancements (Reifer, 2012).... The paper "Impact of information Technology on Business" is a worthy example of a term paper on business....
7 Pages (1750 words) Term Paper

Information Systems in Organisations

The paper 'information Systems in Organisations' is an outstanding variant of the presentation on information technology.... The paper 'information Systems in Organisations' is an outstanding variant of the presentation on information technology.... The paper 'information Systems in Organisations' is an outstanding variant of the presentation on information technology.... And for the clients who do not have clear information on how this Cruise Ship Company works, there are FAQs and Before You Go sections on the website to offer help guide services....
9 Pages (2250 words) Speech or Presentation
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us