This report discusses data security issues, their analysis, and solutions. It covers topics like business continuity, AAA, and incident handling. Recommendations for better data security are also provided.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: DATA SECURITY0 Data Security Report Student Name
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Data Security1 Table of Contents Introduction......................................................................................................................................2 Issues in Data Security:...................................................................................................................2 Analyze and evaluate critically all relevant issues:.........................................................................2 Recommendations:..........................................................................................................................3 Conclusion:......................................................................................................................................4 References:......................................................................................................................................4
Data Security2 Introduction Data security and privacy protection are basic fundamental issues of sensitive data and access control in a system (Chen & Zhao, 2012). In this report, I will discuss about three security issues and how issues are analyzed and solved for a system. In aspects of data infrastructures that may be many data security policies for both system and data. It should be in a chain process for access of data from any system (Lopez, 2013). Issues in Data Security: Data security issues can divide in three groups, these are data security issues business continuity, incident handling, and AAA, which is Authentication, Authorization, and accounting. The Business continuity group measures loss of data, and make policies for disaster recovery and standard operating procedures of systems including access controls. All issues are related to data infrastructures. Therefore, governing policies designed for access of data from systems. In current scenario, all systems are connected from Internet for distributed purpose, so data access is allowed for all users. In general, in any system identity is necessary for accessing data for different purposes. Authentication is the term, which used for identification of a person in a system. Authorization establishes a connection between an identity and system for a particular period or session. Data about acceptable and rejected access to systems is accounting. These data used for tracing unauthorized access of systems( Lopez, 2013). Analyze and evaluate critically all relevant issues: Data security is common now days, as lot of reasons behind that, as securing data and systems from unauthorized sources. Data should be managed in systems according to scalability, provenance, and interoperability, also system required secured against external attack of hackers. There are many types of security systems are available for each type of data, but hackers can crack the firewall and get those data. Security means access in system with valid identification or authorization. Therefore, a valid and strong identity should be with every person to access in system. There are many identity provider mechanisms according to security and usability
Data Security3 criteria. The AAA infrastructures are explored new patterns for better security, as well as the consolidation of security metadata models. Servers and agents collect data about data from relative sources for accessing data and systems. In distributed systems, all personal and relative information about a person is openly share to all users, which is a problem for system. Current systems are highly distributed and centralized towards closed community environment and supporting reduced user populations. In the next generation, these systems must provide distributed environment required by data science. In the current time, data aggregation and open linking are few challenges for betterment of data security. In next decade, authentication challenges are important for processes to identify users. Current model works on few-to-many relationship but in few years, it should be many to many relationships, because number of users increased in high rated. For simple and easy, to access and manage required Data infrastructures supports. In coming years, highly distributed and heterogeneous infrastructures are needed for managing security. In aspect of data security, general metadata schemas should be integrated with security metadata, also use data modeling and management. Virtual research environment and data services foundation may be effective or beneficial for Data security issues.In case of mobile data security, have limitations in terms of data size, memory support, and processing load. Cryptography based secure data storages are useful for data security(Yan, et al., 2017).In vote bank analysis, it was difficult to manage and get the details of vote bank and fund collection, so advanced encryption techniques enabling different mechanisms to access secured data(Shinde & Chokhandre, 2016).Data handling is done by Big Data now days, such that the principles behind privacy and preventing attacks are more affective(Zharova & Alin, 2017). Recommendations: Integrated with different academic communities for acquiring better technologies from the research Coordinate with dedicated research groups to federated identity models; those are applicable beyond use cases, web access, and validation mechanisms. Promote awareness among e-infrastructure projects and exhorting them to consider their data security requirements from the beginning
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Data Security4 Adopt best practices and standards provided by the community. Conclusion: It is concluded that data security is an issues in a well-known organization at each level from entry to organization and highest level of the organization. Sometimes these data are not important but in some cases, it will be very harmful for an organization. In this report discussed about security issues regarding data security. It is also, discussed about these security issues solutions, like cloud computing and Big Data. References: Lopez, D., 2013. Data security.Data Science Journal,10 08, 12(1), pp. 69-74. Chen, D. & Zhao, H., 2012. Data security and privacy protection issues in cloud computing. International Conference on Computer Science and Electronics Engineering,1(1), pp. 647-651. Shinde, . A. & Chokhandre, . S., 2016. Online Votes and Fund analysis for political parties with Data Security.International Journal of Engineering Research and Applications,6(1), pp. 161- 165. Yan, Z., Deng, R. H. & Varadharajan, V., 2017. Cryptography and data security in cloud computing.Elsevier,53(1), p. 3. Zharova, A. K. & Alin, V. M., 2017. The use of Big Data: A Russian perspective of personal data security.Computer Law & Security Review,33(4), pp. 482-501.