Data Security Based on Contemporary Issues: A Comprehensive Report

Verified

Added on  2023/06/07

|7
|1286
|468
Report
AI Summary
This report delves into the critical realm of data security, focusing on contemporary challenges and solutions within the information technology landscape. The report begins by defining data security and its importance in protecting sensitive information from unauthorized access, emphasizing practices like encryption, key management, and tokenization. It then discusses the vital role of data within organizations, covering employee credentials, client details, and financial records, highlighting the necessity of privacy measures across various platforms. The report reviews the significance of data security, particularly within sectors like healthcare, and underscores the need for strong passwords, firewalls, and regular software updates to protect data. The report emphasizes encryption, data backups, and data masking. Finally, it concludes with recommendations such as strong passwords, firewalls, and regular software updates, as well as the installation of proper antivirus software.
Document Page
Running head: DATA SECURITY BASED ON CONTEMPORARY ISSUES
Data Security based on Contemporary Issues
Name of the Student
Name of the University
Author’s note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1DATA SECURITY BASED ON CONTEMPORARY ISSUES
Table of Contents
1. Introduction..................................................................................................................................2
2. Discussion....................................................................................................................................2
3. Conclusion...................................................................................................................................4
4. Recommendation.........................................................................................................................4
5. References....................................................................................................................................5
6. Bibliography................................................................................................................................6
Document Page
2DATA SECURITY BASED ON CONTEMPORARY ISSUES
1. Introduction
In the recent times, the security of data within the information technological systems is a
major matter of concern. The security of data would be defined as the protection of data from
various forms of unauthorized access to the information systems and servers where the data is
stored. The aspect of data security would include the processes of data encryption, practices of
key management and tokenization (Demirkan and Delen 2013). These form of practices would
help the protection of data from all forms of applications and various types of platforms.
2. Discussion
I have reviewed the article of Yu et al. 2014 based on data security issues within the
cyberspace and cloud computing environment. Based on the understanding from the
contemporary issues related to security of data within information systems, I have understood
that data plays a much vital role within an organization. This data might consist of various
important credentials of the employees within the organization, account details of the clients as
well as people within the organization (Safa, Von Solms and Furnell 2016). These records also
contain the financial records of the organization, which is another very important aspect of huge
concern.
The security of data would refer to the various kinds of important measures of privacy,
which should be applied within the information systems. The measures of privacy within data
should also be applied to various kinds of database servers, websites and computers situated
within the information systems. The security of data would also refer to the corruption of data.
The topic of data security is a very important aspect for various IT organizations irrespective of
type and size of the organization (Rao and Selvamani 2015). There are various forms of
Document Page
3DATA SECURITY BASED ON CONTEMPORARY ISSUES
examples based on the technologies related to data security, which would include the purpose of
backups, masking of data and erasing of data. Based on the various understanding from journals
and newspapers, I have understood that the one of the primary key based on the security of data
is based on encryption. In this types of methods, the various hard devices, hardware/software and
digital data are encrypted with technological based standards. This would help in unreadable
format of data, which could not be cracked by hackers or any other unauthorized users.
In the various reports published by various IT organization from all over the globe, I had
reviewed and understood that these organizations have put a major amount of financial based
investments for ensuring high level of security standards in order to protect their critical assets.
The security of data is hugely critical for various organizational sectors that might also include
the health sector. The implementation of proper methods of data security within these
organizations also includes the proper form of inclusion within the privacy of electronic medical
record (EMR). According to my perspective, this could be achieved by creating a high level of
awareness about the rights of information to patients and doctors that would be in relation with
the data release policy that would be applied to various hospitals, physicians, laboratories and
other forms of medical facilities (Sultan 2014).
The various forms of standards of data encryption based within various organizations
would be helpful for simplify the sensitive data within the organizations softwares (Sagiroglu
and Sinanc 2013). The security of data would include various kinds of aspects such as the
management of security keys, data protection within enterprises, security of the payments and
security of mobile devices. Security is also needed in order to protect the data stored within the
web browsers. Without the proper form of security measures there would be many problems that
would arise within the privacy of information. Vital information related to credit/debit card
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4DATA SECURITY BASED ON CONTEMPORARY ISSUES
details are also stored within the information systems. Hence, this is a vital matter of concern that
should be addressed (Rewagad and Pawar 2013).
3. Conclusion
Based on the above report, I have come to the conclusion that the security of data is a
matter of huge concern for various organizations. These organizations have the major form of
responsibility to secure the data and various kinds of records within the organizations, which are
considered as an important aspect for the organizations. Various customers and employees
within the organizations have a high level of trust on the organization. Hence these organizations
should implement various forms of standards within the security aspects of data.
4. Recommendation
Based on the understanding from the above report, I could recommend that the
organizations could implement some forms of measures within the organization for the
efficiency of securing the data. They should strong of passwords, which would be hard to get
cracked by unauthorized users. A strong form of firewall setup system would be essential for
designing the protected network. The software system, which are regularly used should be
updated regularly based on the latest security patches. Another type of security aspect based on
my perspective that should be implemented is the installation of proper antivirus.
Document Page
5DATA SECURITY BASED ON CONTEMPORARY ISSUES
5. References
Demirkan, H. and Delen, D., 2013. Leveraging the capabilities of service-oriented decision
support systems: Putting analytics and big data in cloud. Decision Support Systems, 55(1),
pp.412-421.
Rao, R.V. and Selvamani, K., 2015. Data security challenges and its solutions in cloud
computing. Procedia Computer Science, 48, pp.204-209.
Rewagad, P. and Pawar, Y., 2013, April. Use of digital signature with diffie hellman key
exchange and AES encryption algorithm to enhance data security in cloud computing.
In Communication Systems and Network Technologies (CSNT), 2013 International Conference
on (pp. 437-439). IEEE.
Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model
in organizations. Computers & Security, 56, pp.70-82.
Sagiroglu, S. and Sinanc, D., 2013, May. Big data: A review. In Collaboration Technologies and
Systems (CTS), 2013 International Conference on (pp. 42-47). IEEE.
Sultan, N., 2014. Making use of cloud computing for healthcare provision: Opportunities and
challenges. International Journal of Information Management, 34(2), pp.177-184.
Document Page
6DATA SECURITY BASED ON CONTEMPORARY ISSUES
6. Bibliography
Yu, C., Yang, L., Liu, Y. and Luo, X., 2014, November. Research on data security issues of
cloud computing. In Cyberspace Technology (CCT 2014), International Conference on (pp. 1-6).
IET.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]