The Issue of Data Security

Published: 2021-07-03 14:35:04
essay essay

Category: IT

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics


The Issue of Data Security
The purpose of this proposal is to justify the issue of Data Security. Proof to questions such as: how secure is our data? What measures can we take to secure personal and company data? Can we be secure online? Data Security stems from as far back as the time of Julius Caesar when Caesar cipher was invented in 50BC. Information security had much advancement in World War Two. With rapid advancements in telecommunications at the end of the 20th century, in areas such as computer hardware and software. Within this document, issues such as how secure data really is, the measures taken to make it secure and what companies are doing about it shall be looked at. Also the issue of online security shall be discussed.
Data Security
Company information is vital to people inside and outside of a company. Information that is confidential such as bank transactions and credit card details need to be protected. Also information on new products, customer information and marketing strategies are also classed as confidential and need to be protected. If this information was lost or stolen and ended up in the wrong hands, it could become very damaging to the company in question. That is why data security is important as it protects against theft and misuse. The threat of theft can be done through hacking, freaking and viruses. Security of business data can also be attached from within a company through a disgruntled employee, or an employee who has recently quit and gone to a competitor* (Stroman 2004). * Administrative assistant’s & secretary’s handbook There are a number of steps that can be taken to protect both personal and the company’s data, these include:

Audit Logs – This method means a record of who has been using the computer system is recorded. The name of the user, the time accessed and the files that were accessed is also recorded.
Codes – Codes such as encryption* (Salomon 2003) codes of data files are a common means of protection. The files are encrypted so that without the correct decryption procedure, if they get in the wrong hand the files only appear as random symbols.
Backups – In case of the event of viruses getting through, a common method is to do backup of system files on a regular basis, normally done daily.
Firewalls – Having a firewall system installed protects any from such viruses getting access to the companies servers.

Data Security is safe and reliable, but there can be problems. With encryption there are problems** (Damgard 1999). Modern cryptography is used for encryption, where a secure protocol or scheme is selected. The problem with protocol design is mainly that it can be insecure, for example is the Electronic Code-Book (ECB) encryption mode. The problem has been made through the work of Goldwasser and Micali.With web security*** (Thurasingham 2001) web security and privacy can be done through access control**** (Farkas 2004) of XML, which is essentially done through intrusion detection techniques. * Data privacy and security ** Lectures on Data Security: Modern Crytology in theory and practise *** Data and applications security: developments and directions **** Research directions in data and applications security XVIII
Damgard I, (1999) Lectures on Data Security: Modern Crytology in theory and practise, Springer Publishing. Stroman J, Wauson J, (2004) Administrative assistant’s & secretary’s handbook, Library of Congress Cataloging-in-Publications. Second Edition. Thuraisingham B, Van de Riet R, Dittrich K, Tari Z (2001) Data and applications security: developments and direcections, Kluwer Academic Publishers. Farkas C, Samarati P (2004) Research directions in data and applications security XVIII, Kluwer Academic Publishers. Salomon D (2003), Data privacy and security, Springer Professional Computing.

Warning! This essay is not original. Get 100% unique essay within 45 seconds!


We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read