Wednesday, February 12, 2020
Technology Evaluation and Recommendation Research Paper - 1
Technology Evaluation and Recommendation - Research Paper Example At the same time as dealing with these challenges, business organizations always struggle with how to defend their intellectual property by minimizing the costs and harm to brand that can result from unintended exposure of employee and customer data (Penton Media, Inc., 2012). Additionally, data and information security has come on top on the list of the main issues that are being faced by information systems executives nowadays. In this scenario, there are numerous aspects and factors that cause serious issues to data and information security. Some of the important aspects that can create serious security issues can include illegal access to a computer or network, or storage room, destruction due to fire, flood, earthquake and hurricane. At the present, a large number of researches are being carried out to determine the ways and suggest solutions to make organizational data information more secure. In fact, it is essential to deal with these issues as they can cause customersââ¬â ¢ dissatisfaction or even whole business failure (Loch & Carr, 1992; Penton Media, Inc., 2012; Shulman, 2006). This report presents an analysis of the potential threats to the data and also suggests solutions for them. One of the major security issues that can cause a serious challenge for data security is excessive privilege abuse. When database or application users are provided access to databases with privileges that go beyond the needs of their working job purpose, in this scenario, these privileges can be used for carrying out illegal tasks. In addition, a given data user ends up with extreme privileges for the simple cause that database administrators do not have the time to describe as well as update rough access privilege control method for every user (Shulman, 2006). This problem can be resolved by using various techniques. One of the basic techniques is a username and password based access. Though, it is easy to use but in many cases users forget their passwords and these passwords are accessed by illegal users. Another solution to deal with this problem is the implementation of effective security measures against the excessive privileges that is established through the query-level access control. In this scenario, the query-level access control mechanism will limit database rights to minimum necessary SQL processes (UPDATE, SELECT, etc.) and data. In addition, the granularity of database access control has to expand beyond the table to specific rows of columns in a table (Shulman, 2006). Another major threat is backup data exposure. This is another most important data security problem that is based on the backup database storage media that is completely unprotected from attack. As an effect, a number of high profile and data related security breaches can happen and any person can illegally access the database backup tapes and hard disks (Ponemon, 2007). Though, username and passwords based technique can be used to deal with this issue but it is not as much effective (as discussed above). In order to deal with this issue all data backups have to be encrypted. At the present, there are numerous encryption techniques available. Some of the well-known techniques that can be used for this purpose include public key cryptography and hashing. These techniques are very effective in protecting the data (Ponemon, 2007). T
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.