Description
ABSTRACT
Technology continues to be a boon for entrepreneurs, offering increased mobility, productivity at shrinking expense. But as useful as modern innovations such as smartphones, tablet PCs, and cloud computing , they also present specific security concerns.
When you consider all the important data you store virtually — from financial records, to customers’ private information — it’s not hard to see why one breach could seriously damage your business.
Many cyber-attacks succeed due to weak data security. Access to all equipment, wireless networks, and sensitive data should be guarded with strong data security system. The aim of this study is to carry out a research of the issue of data security.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
- AIM/OBJECTIVE OF THE PROJECT
- SCOPE OF THE STUDY
- IMPORTANCE OF DATA SECURITY
- PURPOSE OF THE STUDY
CHAPTER TWO
LITERATURE REVIEW
- OVERVIEW OF THE STUDY
- DATA SECURITY VS. DATA PROTECTION VS. DATA PRIVACY
- REVIEW OF DATA SECURITY COMPLIANCE AND REGULATIONS
CHAPTER THREE
METHODOLOGY
- DATA SECURITY RISKS
- DATA SECURITY SOLUTIONS AND TECHNIQUES
CHAPTER FOUR
- THREATS TO DATA SECURITY
- FUNDAMENTAL DATA SECURITY REQUIREMENTS
CHAPTER FIVE
- CONCLUSION
- RECOMMENDATION
- REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
Today, electronic systems are commonly used by government, business and consumers. There are many types of electronic systems and connected devices used for a variety of beneficial purposes and entertainment. The use of data is a common element across these systems, some of which may be confidential information, personal data and or sensitive data.
A reliable electronic system must have adequate security to protect the data the system is entrusted to process and use. Data leaks and security breaches threaten the ability of customers to trust businesses and their products. Flawed or inadequate data security to provide robust data protection puts consumers’ privacy at risk.
Too often, privacy and information security are thought of as separate and potentially opposing concerns. However, there are large areas of interdependency between these two important policy areas. Privacy and information security must work in harmony and support each other to achieve the goal of consumer privacy. Privacy requires that consumers have the capacity to decide what data about them is collected and processed, and the data must have safeguards driven by appropriately secure technologies and processes.
Data security is the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Privacy is an individual’s right or desire to be left alone and or to have the ability to control her own data. Data security also enables the effective implementation of protective digital privacy measures to prevent unauthorized access to computers, databases and websites. Data security and privacy must be aligned to effectively implement consumer privacy protections.
An effective risk-based privacy and security framework should apply to all collection of personal data. This does not mean that all frameworks solutions are equal. The risks of collection and processing the personal data must be weighed against the benefits of using the data. Transparency, choice and reasonable notice should always be a part of the way data is collected. The specific solutions of a framework may vary based on the risk and specific types of data. The key is to have in place a proactive evaluation to provide the most effective protection for the specific application and data use.
Data security has always been important. But since more people are working remotely as a result of the current health crisis, there are more opportunities for unauthorized access to your data than ever before.
And hackers are taking advantage of it. Interpol and the U.S. Chamber of Commerce, for example, are both reporting a massive increase in the occurrence of cyber-attacks since the pandemic began.
So, no matter what your organization does, if it processes personally identifiable data (PII), improving your data security is an absolute must for 2021 (and beyond). Here’s everything you need to know about data security for your organization, including top threats, legal compliance requirements, and best practices.
1.2 AIM AND OBJECTIVES OF THE STUDY
The main aim of this study is carryout a study on a process of protecting corporate data and preventing data loss through unauthorized access.
Objectives
At the end of this study, student involved will be able to:
- Understand the importance of data security
- Discover data security challenges
- Learn about solutions and techniques
1.3 SCOPE OF THE STUDY
This work discuses insecurity issues of data and the process of protecting corporate data and preventing data loss through unauthorized access. This includes protecting your data from attacks that can encrypt or destroy data, such as ransomware, as well as attacks that can modify or corrupt your data. Data security also ensures data is available to anyone in the organization who has access to it.
1.4 IMPORTANCE OF DATA SECURITY
Data security also enables the effective implementation of protective digital privacy measures to prevent unauthorized access to computers, databases and websites. Data security and privacy must be aligned to effectively implement consumer privacy protections.
1.5 PURPOSE OF THE STUDY
Transactions, knowledge, communications, databases, infrastructure; an organization’s information is arguably its most valuable asset. Regardless of legal or regulatory requirements, it is in a business’ best interests to keep its information safe.
The purpose is to:
- Keeps your sensitive data out of the hands of competitors
- Retains data integrity
- Enables easy access to data wherever and whenever it’s required for business operations
If you fail to do this, your vital information could get into the wrong hands or be rendered otherwise useless.
Reviews
There are no reviews yet.