Saturday, June 15, 2019

Technology Evaluation and Recommendation Research Paper - 1

Technology Evaluation and Recommendation - Research Paper ExampleAt the same time as dealing with these challenges, business organizations always contest with how to defend their intellectual property by minimizing the costs and harm to brand that can result from unintended exposure of employee and customer entropy (Penton Media, Inc., 2012). Additionally, data and info security has come on top on the list of the main issues that are being faced by information systems executives nowadays. In this scenario, there are numerous aspects and factors that instance serious issues to data and information security. Some of the authorized aspects that can create serious security issues can include illegal rise to power to a computer or network, or storage room, destruction due to fire, flood, earthquake and hurricane. At the present, a large number of researches are being carried come out of the closet to determine the ways and suggest solutions to make organizational data information more secure. In fact, it is essential to deal with these issues as they can ca engross customers dissatisfaction or even whole business failure (Loch & Carr, 1992 Penton Media, Inc., 2012 Shulman, 2006). This report presents an analysis of the potential threats to the data and also suggests solutions for them. One of the major security issues that can cause a serious challenge for data security is unwarranted privilege abuse. When database or application users are provided access to databases with privileges that go beyond the needs of their working moving in purpose, in this scenario, these privileges can be used for carrying out illegal tasks. In addition, a given data user ends up with extreme privileges for the simple cause that database administrators do not construct the time to describe as well as update rough access privilege bid method for every user (Shulman, 2006). This problem can be resolved by using various techniques. One of the basic techniques is a username and password based access. Though, it is easy to use but in many cases users forget their passwords and these passwords are accessed by illegal users. Another solution to deal with this problem is the implementation of effective security measures against the excessive privileges that is established through the query-level access control. In this scenario, the query-level access control mechanism will limit database rights to minimum necessary SQL processes (UPDATE, SELECT, etc.) and data. In addition, the granularity of database access control has to expand beyond the table to specific rows of columns in a table (Shulman, 2006). Another major threat is backup data exposure. This is another most important data security problem that is based on the backup database storage media that is completely unprotected from attack. As an effect, a number of high profile and data related security breaches can happen and any person can illegally access the database backup tapes and hard disks (Ponemon , 2007). Though, username and passwords based technique can be used to deal with this issue but it is not as much effective (as discussed above). In order to deal with this issue all data backups have to be encrypted. At the present, there are numerous encryption techniques available. Some of the well-known techniques that can be used for this purpose include public appoint cryptography and hashing. These techniques are very effective in protecting the data (Ponemon, 2007). T

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.