Data Security Report: Evaluating Issues and Providing Solutions

Verified

Added on  2023/06/08

|5
|1112
|313
Report
AI Summary
This report provides an overview of data security, discussing critical issues and offering recommendations for improvement. It begins by introducing the fundamental concepts of data security and privacy, emphasizing their importance in safeguarding sensitive information. The report then identifies and analyzes key data security issues, categorizing them into business continuity, incident handling, and AAA (Authentication, Authorization, and Accounting). It explores the challenges posed by these issues, particularly in the context of interconnected systems and the increasing reliance on the Internet. The analysis delves into the need for robust identity management, authentication mechanisms, and authorization protocols. Furthermore, the report evaluates these issues critically, examining the impact of data breaches and unauthorized access. Finally, the report provides actionable recommendations, including integrating with academic communities for technological advancements, coordinating with research groups for federated identity models, and promoting awareness of data security requirements. The conclusion reinforces the significance of data security at all organizational levels and highlights the role of solutions like cloud computing and Big Data in addressing these challenges.
Document Page
Running Head: DATA SECURITY 0
Data Security
Report
Student Name
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Data Security 1
Table of Contents
Introduction......................................................................................................................................2
Issues in Data Security:...................................................................................................................2
Analyze and evaluate critically all relevant issues:.........................................................................2
Recommendations:..........................................................................................................................3
Conclusion:......................................................................................................................................4
References:......................................................................................................................................4
Document Page
Data Security 2
Introduction
Data security and privacy protection are basic fundamental issues of sensitive data and access
control in a system (Chen & Zhao, 2012). In this report, I will discuss about three security issues
and how issues are analyzed and solved for a system. In aspects of data infrastructures that may
be many data security policies for both system and data. It should be in a chain process for
access of data from any system (Lopez, 2013).
Issues in Data Security:
Data security issues can divide in three groups, these are data security issues business continuity,
incident handling, and AAA, which is Authentication, Authorization, and accounting. The
Business continuity group measures loss of data, and make policies for disaster recovery and
standard operating procedures of systems including access controls. All issues are related to data
infrastructures. Therefore, governing policies designed for access of data from systems. In
current scenario, all systems are connected from Internet for distributed purpose, so data access
is allowed for all users. In general, in any system identity is necessary for accessing data for
different purposes. Authentication is the term, which used for identification of a person in a
system. Authorization establishes a connection between an identity and system for a particular
period or session. Data about acceptable and rejected access to systems is accounting. These data
used for tracing unauthorized access of systems ( Lopez, 2013).
Analyze and evaluate critically all relevant issues:
Data security is common now days, as lot of reasons behind that, as securing data and systems
from unauthorized sources. Data should be managed in systems according to scalability,
provenance, and interoperability, also system required secured against external attack of hackers.
There are many types of security systems are available for each type of data, but hackers can
crack the firewall and get those data. Security means access in system with valid identification or
authorization. Therefore, a valid and strong identity should be with every person to access in
system. There are many identity provider mechanisms according to security and usability
Document Page
Data Security 3
criteria. The AAA infrastructures are explored new patterns for better security, as well as the
consolidation of security metadata models. Servers and agents collect data about data from
relative sources for accessing data and systems. In distributed systems, all personal and relative
information about a person is openly share to all users, which is a problem for system. Current
systems are highly distributed and centralized towards closed community environment and
supporting reduced user populations.
In the next generation, these systems must provide distributed environment required by data
science. In the current time, data aggregation and open linking are few challenges for betterment
of data security. In next decade, authentication challenges are important for processes to identify
users. Current model works on few-to-many relationship but in few years, it should be many to
many relationships, because number of users increased in high rated. For simple and easy, to
access and manage required Data infrastructures supports. In coming years, highly distributed
and heterogeneous infrastructures are needed for managing security. In aspect of data security,
general metadata schemas should be integrated with security metadata, also use data modeling
and management. Virtual research environment and data services foundation may be effective or
beneficial for Data security issues. In case of mobile data security, have limitations in terms of
data size, memory support, and processing load. Cryptography based secure data storages are
useful for data security (Yan, et al., 2017). In vote bank analysis, it was difficult to manage and
get the details of vote bank and fund collection, so advanced encryption techniques enabling
different mechanisms to access secured data (Shinde & Chokhandre, 2016). Data handling is
done by Big Data now days, such that the principles behind privacy and preventing attacks are
more affective (Zharova & Alin, 2017).
Recommendations:
Integrated with different academic communities for acquiring better technologies from
the research
Coordinate with dedicated research groups to federated identity models; those are
applicable beyond use cases, web access, and validation mechanisms.
Promote awareness among e-infrastructure projects and exhorting them to consider their
data security requirements from the beginning
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Data Security 4
Adopt best practices and standards provided by the community.
Conclusion:
It is concluded that data security is an issues in a well-known organization at each level from
entry to organization and highest level of the organization. Sometimes these data are not
important but in some cases, it will be very harmful for an organization. In this report discussed
about security issues regarding data security. It is also, discussed about these security issues
solutions, like cloud computing and Big Data.
References:
Lopez, D., 2013. Data security. Data Science Journal, 10 08, 12(1), pp. 69-74.
Chen, D. & Zhao, H., 2012. Data security and privacy protection issues in cloud computing.
International Conference on Computer Science and Electronics Engineering, 1(1), pp. 647-651.
Shinde, . A. & Chokhandre, . S., 2016. Online Votes and Fund analysis for political parties with
Data Security. International Journal of Engineering Research and Applications, 6(1), pp. 161-
165.
Yan, Z., Deng, R. H. & Varadharajan, V., 2017. Cryptography and data security in cloud
computing. Elsevier, 53(1), p. 3.
Zharova, A. K. & Alin, V. M., 2017. The use of Big Data: A Russian perspective of personal
data security. Computer Law & Security Review, 33(4), pp. 482-501.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]