Approaches, Significance, Pros and Cons of Securing Data
✅ Paper Type: Free Essay | ✅ Subject: Computer Science |
✅ Wordcount: 4840 words | ✅ Published: 18th May 2020 |
Introduction
Rapid technology advancement is the root source of the problems. Spyware, one of the top most methods through which hackers are gaining unauthorized access to protected information. Such attacks compromise the posing of the private data and information. High rates of the threats in various organization is the root problem to be addressed in this research paper through the analysis of secure data processing. Issues to do with data security has been a major issue in most fundamental organizational activity. Ensuring that any given data is secure has therefore turned out to be essential as it is vital to most of the operations. Report revealed that data security is among the top challenges cyber security is facing. This is so in both medium and large businesses. Poor data security issues if handled poorly can make organizations incur extra costs making every operation very expensive. The report further revealed that approximately USD6.8 million per total breach are lost per breach in every year. Tracing back to the year 2007 in January, JX Corporation states that it has turned out to be one of the largest data breach. The organization incurred high losses. A similar case was recorded by another company, Global Payments Inc. also recorded a similar loss. Such cases and many other similar ones are the ones which triggered me towards researching on this topic. My aim was to come up with solutions of this issues. Although several scholars have been attempting to solve this issue of data security during processing, most of them have failed to address the issues to do with data security from the cloud adoption perspective. Despite their little contribution, most of the issues are associated with cloud computing (Memon et al., 2017). They have neglected the aspect of ensuring data security during processing, through a critical analysis of the following issues.
Data backup is essential, and it is supposed to be done regularly. Loss of data is one of the most severe issues associated with data processing as the entire process will be down with a lack of information. Every organization needs to be prepared prior. Data backup can be done either manually or automatically. In addition to this, the backup should be made secure as well since the perpetrators might choose to go for the backup after destroying the significant data and information.
Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Find out more about our Essay Writing Service
Any data available in the organization need to be subjected to complicated and robust password. This protects the issues of password cracking. Strong passwords refer to passwords which have the combination of characters, numerals, lowercase letters, uppercase letters as well as special characters. Such passwords make it hard for hackers to crack them. Every password needs to be distinct and unique if meant to represent a different portion of data and information.
This is one of the most important strategies which ensures that the data is secured. Presence of a plan in place addresses several issues, mainly after there has been a data breach. The project will be responsible for determining the various individuals who have been authorized to access the information and those who are not allowed. Such plans and policies help keep people in line and that they are all expected to have and undertake (Stallings, 2017). Further, any policy adopted should be free to adjustments depending on the demands that can be made. This is because of the dynamic nature of all activities about cloud adoption and how processing activities are carried out nowadays.
For any organization or firm, it is essential to distinguish sensitive data from other data. The most valuable data that supports the survival of the organization must be handled with too much care. In case of any breach, it is essential to know the priority and order of the type if the data need to be safeguarded.
Till now we have completely placed the introductory part and we will cover Literature review, Methodology for writing the Literature review, Business implications and the result in the upcoming sections.
Literature review
Stallings (2017) covers cryptography and Network Security, which defines data security as a set of standards together with technologies responsible in the protection of data and information against deliberate, intentional, or even accidental destruction, disclosure, and modification. Sharing of resources and hosts in cloud computing if not managed well can be tedious and can result in the data loss and poor data processing. Data security can be applied using a range of techniques and technologies. According to Stallings (2017), technologies and techniques which can support data secure data and information during processing include “administrative controls, physical security, logical controls, organizational standards, and other safeguarding techniques that limit access to unauthorized or malicious users or processes.”
Data security services are often considered with various mechanisms. Here X.800 security services are decided as a service which elaborates the security layer in communicating the open source systems and client systems to ensure in providing the security for the transforming data when it is processed or transferred. These security policies make sure the data connection between different entities, which are considered as authentic. According to Stallings (2017), he describes clearly about the peer entity and data origin authentications. By the name itself we can say that peer entity authentication accomplished with some logical connections between the entities which are identified from both ends. Data-Origin authentication provides wireless or connectionless mechanisms in data transfers approved by the source systems. Data Integrity also plays a vital role in data security mechanisms. Where it makes sure the data received which exactly the same data is sent by authorized user (Stallings, 2017).
This is one of the most important strategies which ensure that the data is secured. Presence of a plan in place addresses several issues, mainly after there has been a data breach. The project will be responsible for determining the various individuals who have been authorized to access the information and those who are not allowed. Such plans and policies help keep people in line and that they are all expected to have and undertake. Further, any policy adopted should be free to adjustments depending on the demands that can be made. This is because of the dynamic nature of all activities about cloud adoption and how processing activities are carried out nowadays (Stallings, 2017).
The Author explained about the different types of security measures and connections between source entities to target entity in securing the data. It is an initial stage of the securing the data while it processes. Securing the data while processing is limits to some encryption strategies but transferring the business data between one or more entities becomes bit challenging. Every organization has a data processing between users to client entity. Here client entity is meant to be a data center of a company. Network security measures plays vital role on entity connection, Where Intranet and Internet is a network source to transfer the processed data between the user system and the data center or production servers. The data will be processed on production servers which are handled or managed from the user system. The network between user entity and end processing servers should be secured with the security policies as described above.
According to Rongzhi Wang, Technologies about data protection come in several ways, models and approaches. These technologies safeguard data from growing several threats that can impact the entire process of data processing. Most of the dangers associated are external threats, and they did not emerge from within the organization. However, organizations affected are forced to look for alternatives on how they can mitigate or even completely get rid of them. Sample ways of securing data include:
Data encryption refers to the application of a code towards the protected data to every specific part of data and information, with which access to the safeguarded information is limited. The data cannot be accessed by anyone unless he/she provides the assigned key which can be used to de-encrypt the data (Rongzhi Wang, 2016).
Data masking is a technology through which areas of data can be safeguarded against external malicious sources. This technology also limits the internal personnel who can access the data and information. An excellent example of this technology is masking the first 12 numerals of accrediting card number; individuals will be expected to provide the remaining ones to utilize such data (Rongzhi Wang, 2016).
At some point, any data that is not actively utilized need to be eliminated from all the relevant systems and replaced by active and functional pieces of data. For instance, request from any customer to get their information deleted from any system that they have ceased to be members to need to be removed. This creates space and also enhances efficiencies in the data protected. Data erasure is a technology that is software based. This technology allows the overwriting of any sort of data whose purpose is the destruction of any type of data present in any digital media or hard disk (Rongzhi Wang, 2016).
Data resilience technology entails the creation of data backups and creating copies of the data needed for processing. Data can be stolen accidentally, can be corrupted, and it can also be stolen. Such deeds can hinder entire activities of data processing (Rongzhi Wang, 2016).
Finally we can conclude that capacity in the fast advancement in the meantime additionally brings a progression of negative issues, particularly information security issues, which truly frustrated the further broad use of distributed storage investigation of issues encompassing the recognition can recover the information accessibility and information, first presented the examination status at home and abroad identified with the issue, and thinks about and breaks down the favorable circumstances and impediments between them, where a definite investigation of the inadequacies and flow look into in this field and can be improved.
Suzie, Reiter, Reimair, Venturi and Kubo covers about securing data sharing and the way of processing data in cloud. In the current cloud computing era, most firms associated with data processing are prone to data breaches. Despite the increased number of offenses, data security among the victims can be improved, and through the utilization of the aforementioned emerging technologies. Time and money are worth being invested in matters to do with data security as this will reduce issues to do with the destruction of the reputation and associated challenges. The following are the five significant ways through which secure data processing can be guaranteed.
Data backup is essential, and it is supposed to be done regularly. Loss of data is one of the most severe issues associated with data processing as the entire process will be down with a lack of information. Every organization needs to be prepared prior. Data backup can be done either manually or automatically. In addition to this, the backup should be made secure as well since the perpetrators might choose to go for the backup after destroying the significant data and information. Any data available in the organization need to be subjected to complicated and robust password. This protects the issues of password cracking. Strong passwords refer to passwords which have the combination of characters, numerals, lowercase letters, uppercase letters as well as special characters. Such passwords make it hard for hackers to crack them. Every password needs to be distinct and unique if meant to represent a different portion of data and information (Suzie, Reiter, Reimair, Venturi & Kubo, 2015).
This is one of the most important strategies which ensure that the data is secured. Presence of a plan in place addresses several issues, mainly after there has been a data breach. The project will be responsible for determining the various individuals who have been authorized to access the information and those who are not allowed. Such plans and policies help keep people in line and that they are all expected to have and undertake. Further, any policy adopted should be free to adjustments depending on the demands that can be made. This is because of the dynamic nature of all activities about cloud adoption and how processing activities are carried out nowadays. For any organization or firm, it is essential to distinguish sensitive data from other data. The most valuable data that supports the survival of the organization must be handled with too much care. In case of any breach, it is essential to know the priority and order of the type if the data need to be safeguarded (Suzie, Reiter, Reimair, Venturi & Kubo, 2015).
Every firm need to determine the kind of personnel granted permission to access any given information. This will facilitate the accountability of the data and information in case an issue arises. Also, this limits the number of people accessing and altering the data and hence reducing the security threats of the data used in processing. Also, from an administration perspective, it should be determined the type of access that various departments are granted; this will also uphold accountability. “Credential hygiene is essential to strong database security because attackers often, if not nearly always, seek to compromise privileged accounts to gain access to confidential data. Minimizing permanent privileged accounts reduces the risk that one of those accounts will be compromised and used maliciously” (Suzie, Reiter, Reimair, Venturi & Kubo, 2015).
By providing security in the cloud environment we can securely transmit the information in convenient way. Initially who ever needs the security they are going to request security mechanisms for the cloud provider. The cloud provider used to take put some extra charges for providing security features on the cloud. Now security is even present in the public domain of the cloud there by any one access the cloud security features which help everyone who is using the cloud.
As per Huang et al every firm’s data security requires a unique approach and requirement depending on the processing activity that they are subjected to. The following are the eight tools that together can mitigate the threats associated with data processing security. Any backup solution that an organization decides to go for must be able to transform the images into snapshots, then later restore them towards distinct hardware. Although this might not fully suffice the entire migration, products like lap links can be used to aid PC mover for a rapid setting transfer. This tool enhances the early security of data and information.
Defragmentation should be noted that the continuous writing, copying and moving files from one location to another impact the overall performance through slowing down of the overall performance of the risks associated with these activities. A defragmentation tool which is an inbuilt windows tool can be used in ensuring that lease space of the disk is utilized at any point and time. The device also provides regular maintenance of the drive. To enhance the overall performance of the disk, additional tools like smart Defrag can be used, hence offering impressive features including automated execution and automatic scheduling (Huang et al., 2017).
Installation of the anti-malware software is essential as it takes control of the malware which might pose threats to the data protected. Regular update of this software will also ensure that the latest malware is contained and threats eliminated. Viruses and malware impact data processing and execution because of the associated features and characteristics in their presence. These behaviors include insufficient storage, disappearing of crucial files mysteriously, among others. Such activities impact the overall data processing (Huang et al., 2017).
Password Protection isthe most common challenge with passwords is memorizing them and properly managing them while keeping them safe. In the current era, it is impossible for anyone interacting with data to take part in various activities without having been required to offer passwords at some point. To ensure that supporting them, special software like LastPass tools need to be utilized because this has proven to be one of the most potent password supervision time savers (Huang et al., 2017).
Utilization of Windows System Utilities is responsible administrator who is working towards the reduction and minimization of the data processing insecurities, regular troubleshooting, and utility diagnosis of the associated system is very crucial. This service allows one directly to execute website-based tools free of downloading them and also altering them (Huang et al., 2017).
Finally, we can conclude that Database & Mailbox Recovery data are securing tool allows various data administrators to quickly reach and access the database tables. Through this quick access, they are in a better position to recover the lost data and information, and thus, they will easily export the recovered data into respective places. Granular Restore tool best does the job. There comes a time when all efforts and attempts to save the situation with the malware fails. At such cases, one is typically left with weak systems which in several ways Emsisoft Emergency Kit is the tool to be used in such cases to ensure that the system remains secure.
Manogaran, Thota & Kumar says Increase in use of cloud computing to process and store the big data has been concerned for many researchers in order to protect the data in the cloud environment. Protecting the data in the cloud computing, the old security mechanism has not provided to be efficient enough. In the paper, we are trying to highlight the challenges and possible solution for protecting the data in cloud. In this article the author has proposed new framework called MetaCloudDataStorage to ensure the processing of the data is done safely and also have better insight of the business.
Cloud computing allows the user to access the remote servers to store and process the data. Because of the easy availability of the cloud it faces more security challenges, which are divided into two categories one which is faced by cloud provider and other by customers. As we see huge growth in healthcare, education, social networking and natural resources and so on the amount of data has increased drastically. In order to save this huge amount of data there has been techniques like logging, honey pot detection and encryption are necessity for the organizations (Manogaran, Thota & Kumar, 2016).
MetaCloudDataStorage protects the data from the intruders, this architecture stores the data based on its importance and sensitivity in three different levels such as sensitive, critical and normal. Every level is stored in different data center. MCDS redirects the user to its appropriate data center in the cloud. To process the log files this framework proposes AWS cloud trail (Manogaran, Thota & Kumar, 2016).
MCDS framework is really good for protecting the data in the cloud-computing environment. The map shows number of users who are logged and were logged into the data center. The framework saves the mapping of various data elements to ever provider using MCDS interface. This proposed approach requires high implementation efforts; it provides valuable information that has high impact on the systems. MCDS is also working on real time processing of the streaming data.
Methodology
Method of research
In this research paper, the investigator utilized the descriptive approach by using internet with Google as our primary search engine. This approach, commonly referred to as statistical research method offers the analytical description of the data that is being collected and the associated characteristics. This research responds to who, what, where, how, and when questions. The methodology is also concerned with formulating the relationship between the issue being studied and the possible results of the prior research which have been done. The strategy also tries to develop the relationships present than later give out adequate interpretation of the relevant data. Embedding data security during the data processing approach is never an easy task (Bhatt, 2017). Most organizations which opt to go for this majorly are the ones struggling with issues about information security. Federation of the access control as the primary source of the authorization upholds the confidentiality of the data being shared
Source of data
Available information about traditional access control, which was gained through MAC address adoption, was analyzed. Role-based Access Control was also examined. Information concerning their capabilities was the primary focus. The role that the two have played towards ensuring the security of data during the processing activities. It was further assumed that access control methods have the capabilities of offering the benefits out of other models and hence overcoming the limitations that various people are experiencing.
Methods of collecting data
The data was collected through proper utilization of the library materials and the internet on issues about Access Control and associated benefits and consequences. Oral interviews with questions testing the perception of security during processing were undertaken. A sample questionnaire was designed and so that a good number of people would be able to respond to various issues that were affecting them. The respondents were required to put a mark depicting check on their appropriate response towards the right side of the questionnaire.
Every respondent was rated on a scale of one to five, as demonstrated below.
5- Strongly Agree
4- Agree
3- No Comment
2- Disagree
1-Strongly Disagree
Key Term Searched |
Approx. number of articles found relevant to the topic? |
Refined and Used |
Data Security |
3.14 Million |
4 + |
Data Encryption |
9.2 Million |
5+ |
Data Masking |
9.12 Million |
3+ |
Data Erasure |
1.27 Million |
2+ |
Data Resilience |
9.25 Million |
2+ |
Data Security Tools |
9.21 Million |
11+ |
Cloud Computing |
3.68 Million |
3+ |
Data Protection Principal |
2.7 Million |
4+ |
Utilization of Windows system utility |
1.6 Million |
2+ |
References
- Bhatt, S. (2017). Cryptography–A Technical Review.
- Chang, V., & Ramachandran, M. (2015). Towards achieving data security with the cloud computing adoption framework. IEEE Transactions on Services Computing, 9(1), 138-151.
- Huang, Z., Liu, S., Mao, X., Chen, K., & Li, J. (2017). Insight of the protection for data security under selective opening attacks. Information Sciences, 412, 223-241.
- Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press.
- Lafuente, G. (2015). The big data security challenge. Network security, 2015(1), 12-14.
- Manogaran, G., Thota, C., & Kumar, M. V. (2016). MetaCloudDataStorage architecture for significant data security in cloud computing. Procedia Computer Science, 87, 128-133.
- Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location-based service using asymmetric cryptography scheme. Wireless Personal Communications, 84(2), 1487-1508.
- Rongzhi Wang (2016). Data Security Technology based on Cloud Storage – Procedia Engineering 1340 – 1355.
- Srinivasan, K., Gowthaman, T., & Kanakaraj, J. (2017). Novel copyright is marking approach using steganography and robust RSA asymmetric-key cryptographic technique in audio files. Journal of Discrete Mathematical Sciences and Cryptography, 20(8), 1563-1571.
- Stallings, W. (2017). Cryptography and network security: principles and practice (pp. 92-95). Upper Saddle River: Pearson.
- Suzie, B., Reiter, A., Reimair, F., Venturi, D., & Kubo. (2015). Secure Data Sharing and Processing in Heterogeneous Clouds. Procedia Computer Science 68 ( 2015 ) 116 – 126.
Cite This Work
To export a reference to this article please select a referencing stye below:
Related Services
View allDMCA / Removal Request
If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: