Data Security
Executive summary
This report was based upon evaluating the data security system which benefits the organisation in maintaining quality within the information so that integrity can be retained within the organisation.
As the study progress, it has also discussed the types of data security system that is associated with the process such as email security system that encrypt the confidential data of the information.
Challenges associated with the data security system along with advantages associated with it has also been explained. Finally based on the above-evaluated theory recommendations have been provided to the organisation.
Data security is referred to as the protective digital privacy measures that are used and applied to prevent unauthorized access to computers, websites, and databases.
One of the benefits that data security provides to its users is that it helps in protecting the data from corruption, it is also considered as one of the crucial aspects of IT for organisations of every size and type.
Data security is also enabled with technology encryption, where the digital data, software, and hardware are encrypted and therefore make it difficult for hackers to hack the data.
This report is based upon data security system along with identifying the trends in data security system such as cybersecurity in data security is expected to grow in an exponential rate. Types of data security systems will also be discussed in this report which helps in the integration of data.
The challenges and advantages of a data security system will also be discussed in this report subsequently.
Trends in the data security system
Based on the evidenced gathered from the secondary sources of information it has been identified that the trends that have been identified in the data security system are a reduction in cybersecurity vulnerabilities, a better-secured network, using automation and other processes for cost-effective techniques[1].
Other trends that have been identified in regards to the data security system is increased data privacy and compliance and improving the collection and analysis of data. Based on the gathered evidence it has also been noticed that cybersecurity as a data security system is expected to grow by $ 103 billion by the end of 2020.
The demand of data security in different organisations are also increasing which is increasing the demand of data security system such as demand of data security in telecommunication industry is expected to grow by 11.8% and in resource industry by 11.3%[2].
Finally, the market size of the data security system within the global industry is expected to grow by 9.4% yearly, which mainly contributes to the development of the organisations.
Although, the sharp rise in the data security system indicates that the organisation becomes competent towards maintaining their overall performance some threats are also considered as trends that have a severe impact within the organisation. Increased attacks on the cloud are trending attacking system that impacts on the DDoS system globally[3].
The rise in AI technology is also a globally accelerated trend that has contributed to the growth of the data security system within the organisation. AI in the data security system increases the overall performance and productivity of the firm.
Data security systems are used by the organisation to take proactive measures towards securing data from unapproved access and data corruption throughout the data lifestyle. In today’s business environment data security systems are used by most of the IT organisation which includes data encryption, tokenization and key management practices that are used by the firm to protect data and information[4].
Different types of data security systems are used by the management to protect areas and programs of operating-system for an entire application. The different types of data security systems are as follows.
Network layer security-This is a form of data security system that uses cryptographic techniques alongside other internet protocols that have been designed to protect emails on the internet. The techniques of network layer security also include SSL and TLS for calculating the traffic on the website[5].
The data security system is also used to maintain and monitor the flow of information within the networking system of the organisation.
IPSec Protocol- The IPSec protocol is initially developed to guard interaction by using TCP/IP which is designed by IETF and it provides security and verifications by using the process of cryptography that provides security to the information stored in the database[6]. The two main aspects of modification that form the reason for IPSec are known as Authentication Header (AH) and Encapsulating Security Payload (ESP).
Email security- Email is also termed as the data security system that is used to safeguard the access and content of an email account through the help of email security. It has been noticed that electronic mail is composed, saved and delivered in multiple steps by step procedures.
Advantages of the data security system
The advantages of data security system are that it helps in protecting valuable information of the customers, the database of the customers are protected with the help of custom software and in-house automation solution that benefits in maintaining the information of the customers and keep their loyalties towards the firm[7].
Furthermore, the advantages of the data security system it has been identified that providing data security system benefits in integrating the security system along with providing a better solution to the customers.
Most of the business organisation also prefers to use data security system is because it helps them in keeping ahead of their competitors by building an application security system that benefits in protecting the data’s and increasing the overall performance of the organisation.
Maintaining a high-end data security system enables the companies in keeping their upper hand over their competitors and increase their chances and opportunities.
The data security system also comes in form of LAN communication that benefits the users in integrating their information and adding security within their process so that the best integration of work activities can be performed over the period [8].
One of the advantages of data security system is that it benefits the organisation in reducing the cost of development, inadvertent data loss caused by insuring software might raise the cost of capital, hence it becomes necessary for the organisation to reduce the cost of development alongside maintaining better infrastructure security.
Finally, the advantage of using a data security system also helps in meeting current standards to maintain the current demands of the organisation and build competitiveness for the firm.
Challenges associated with the data security system
The challenges that are associated with the data security system are that distributed frameworks are vulnerable towards fewer data processed which becomes prone towards threat from cyber-attack that increases the risk in the data security system.
Non-relational data store units fail to maintain a security system that increases the threat from middleware that increases the concern within the security system[9].
Evaluating the data security system it has also been identified that challenges that are associated with a data security system are that it increases the vulnerability of fake data generation that increases the complexities within the management alongside it increases the risk and threat within the management.
It has also been identified that challenges that are associated with the data security system are that it increases the trouble of cryptographic protection[10]. This kind of threat mainly increases within the organisation due to lack of protection in the data security system as a result of which huge data chunks slows down the process and degrades the overall performance of the management.
Finally, the challenges that have also been identified are that it also fails to struggles with granular access control as a result overall performance of the firm degrades.
This report was based upon evaluating the data security management were evaluating the data security system various types of data security system has been identified such as network layer security system and email security system which helps in maintaining and protecting the database of the customers for future purposes.
Moreover, it has also been noticed that the trends in data security system such as growth in cybersecurity system also benefits in maintaining information and using it to improve the overall operations of the business.
As the study progress, it has also discussed the advantages of the data security system along with challenges that have been identified with the same.
- Promoting a culture of integrity would be the best way to minimize the risk associated with the data security system, it would help the organisation to keep their employees honest about their work as well as make them responsible for their tasks so that they can perform their task with better efficiency.
- The business organisation can also implement quality control measures that will ensure the security and data governance policies that will help the organisation in monitoring data lineage of data sources that build competitiveness and helps in maintaining quality of functions within the management.
[1] | economic times, “Security,” Economic Times, 9 October 2019. [Online]. Available: https://economictimes.indiatimes.com/small-biz/it/security/articlelist/47280831.cms. [Accessed 9 October 2019]. |
[2] | Cyware, “Cyber-security-news-articles,” Cyware, 9 October 2019. [Online]. Available: https://cyware.com/cyber-security-news-articles. [Accessed 9 October 2019]. |
[3] | Security magazine, “2236-cyber-security-news,” Security, 9 October 2019. [Online]. Available: https://www.securitymagazine.com/topics/2236-cyber-security-news. [Accessed 9 October 2019]. |
[4] | A. e. Pathan, Security of self-organizing networks: MANET, WSN, WMN, VANET, London: CRC Press, 2016. |
[5] | S. Johnson and L. Bolotin, “U.S. Patent,” Data security system with encryption, vol. 9, no. 262, p. 611, 2016. |
[6] | B. Handler, “Technology Policy Associates, LLC, U.S. Patent,” Remote profile security system, vol. 9, no. 276, p. 747, 2016. |
[7] | E. Fleischman, D. Wald, and D. Peterson, “DocuSign Inc, U.S. Patent,” Systems and methods for cloud data security, vol. 9, no. 219, p. 753, 2015. |
[8] | B. Rao, ” Procedia Computer Science,” A study on data storage security issues in cloud computing, vol. 92, no. 1, pp. 128-135, 2016. |
[9] | N. Dey and V. e. Santhi, Intelligent techniques in signal processing for multimedia security, London: Springer International Publishing, 2017. |
[10] | F. e. Hu, Big data: storage, sharing, and security, London: CRC Press, 2016. |