logo

Data Security | Fraud Detection | Report

   

Added on  2022-09-15

6 Pages1113 Words20 Views
 | 
 | 
 | 
Running head: FRAUD DETECTION
FRAUD DETECTION
Name of student
Name of university
Author’s note:
Data Security | Fraud Detection | Report_1

1
FRAUD DETECTION
Table of Contents
Introduction....................................................................................................................2
Discussion......................................................................................................................2
Securing information of social media........................................................................2
Conclusion......................................................................................................................4
Reference........................................................................................................................5
Data Security | Fraud Detection | Report_2

2
FRAUD DETECTION
Introduction
In the modern world, there is immense amount of data that is generated by the users
who use social media regularly. It is required to securely store this data for ensuring that the
security of the users are not threatened by any unauthorised user. This report intends to
analyse the methods by which all the data of users on social media is securely stored with
extensive security and confidentiality is ensured. A brief discussion of the authorities that are
responsible for securing the data of the users has been provided in this report. Lastly this
report concludes with an appropriate conclusion for the report.
Discussion
Securing information of social media
The main responsible authority who are responsible for ensuring the security of all the
information of social media are the business and partly the users. The methods by which the
business protects their data are as follows:
Locking the hard copy files: There are several files and data that is generated from the
social media interactions of the users on the social media platforms. Majority of the files
includes significantly sensitive personal information that are found on the applications of the
employees (Cui et al., 2018).
Encryption: One more extensive method of securing the information is encryption of
all the important data on the servers. With the proper encrypting of the files of the users, the
malicious users would have significant difficulty in accessing the information and it could
ensure proper security of the files (Dekker et al., 2018).
Encrypting cloud data: Majority of the business encrypts all the data that are stored in
the cloud of the business. With the proper encryption of the data on the cloud, the malicious
Data Security | Fraud Detection | Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Services for DAS: Security and Privacy Implications
|25
|2057
|203

Cyber Security Risk Assessment and Mitigation Plan
|5
|523
|106

Cloud Computing and Security Issues
|7
|1432
|40

Improving Communication and Information Systems for a Private Retail Company
|15
|702
|127

Social Media Security Threats and Practices for Secure Social Enterprise Networking System
|4
|942
|274

Information Security Management Case Study 2022
|4
|646
|34