assignment helper

Assignment- Data Risk

7. Potential security risk, data breaches

An organization can face several risks in the protection of data according to the size of the organization. The protection of the data is important to save the organization from competitive threats by storing and securing the data. The cyberattack can be a high risk for an organization because the hackers can hack the data of an organization. They can misuse the data to earn money. Cybercriminals can attack by the use of new ways to hack the important data of an organization (Subashini and Kavitha 2011). Cyber security can help to protect the data from cybercrime like malware, virus, worms, spyware, etc.

In organizations, it can be possible that some employees do not know how to secure the data and they can lose the available data. The lack of security awareness and lack of IT skills can be a big issue for an organization. The available machines in the organization may not be sufficient for the high security of data because they cannot store the big data in a single system.

The organization can need more machines for the security of big data with advanced technology. Usually, it is seen that the organizations do not want to buy current and technological machines due to high cost. But the new technology can provide high security to the company data (Von Solms and Van Niekerk 2013). The up-gradation can be helpful to provide the potential security of the data and remove the related risk.

Get Assignment Help from Industry Expert Writers (1)

The lack of recovery can be a security risk for the organization. The recovery of the data is very necessary for a firm to prepare for security risks in the organization. The important data of an organization can be lost by some virus or damage in the system. So, the recovery of the data is most important to secure the information and data that can be useful in the critical situation of the organization. The data backup can also help the organization to recover its position of the organization in the industry.

If an organization does not have a backup or recovery strategy for data due to a lack of budget, it may bear a great risk for the future of the company (Liu et al., 2012). Cloud networking can also enable cyber risks by providing an open system to access the organizational data by the employees. There can be a risk that an outsider can assess the important data of the organization of misusing.

Data

8. Guideline to mitigate the risk

The data security risk can be possible only by developing an effective data security system in the organization. Cyber security can be part of the system that can help to protect the data from cyber-attacks. Cyber security can need an identification of the potential risks and threats and use the proper process to mitigate it by the use of effective implication.

Cyber security can be effective by the use of proper and current technology, and it can secure the data by the cyber attack (Gonzalez et al., 2012). The proper cyber security policy may help the organization to mitigate the risk of problem identification and implication. It can protect the system, data, and network of the organization from cybercriminal attacks.

The employees of the organization should know how to protect important data. For this protection, the organization can provide training to the employee to secure the data. In this training, the company can develop the security skills of the employee in the workplace.

Get Assignment Help from Industry Expert Writers (1)

Additionally, the organization can be hired an IT professional, who can provide the standard training to the employee (Somani et al., 2010). This training can aware the employee about the security system of the data for better protection and solution of the security problem. In this training, the organization can also instruct the employees that the data is confidential for the company and they should not provide it to the outside of the organization.

The organization can also develop a recovery plan for the security of the data for the future. The backup of the data can solve the issue of data loss. At the same time, the lack of protection in security may be a reason for data loss that can be solved by data recovery.

In the context of cloud computing, the organization can provide network security to the effective control of the outside parties. The security system in cloud computing is provided by the service providers for data security, and there is only a need for enabling the security (Morrow, 2012). An organization should provide the latest technology to the security system of the data that can protect the company data with new technology.

Data

Reference

Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Näslund, M. and Pourzandi, M., (2012) A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications1(1), p.11.

Liu, J., Xiao, Y., Li, S., Liang, W. and Chen, C.P., (2012) Cyber security and privacy issues in smart grids. IEEE Communications Surveys & Tutorials14(4), pp.981-997.

Morrow, B., (2012) BYOD security challenges: control and protect your most sensitive data. Network Security2012(12), pp.5-8.

Somani, U., Lakhani, K. and Mundra, M., (2010) October. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. In Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on (pp. 211-216). IEEE.

Subashini, S. and Kavitha, V., (2011) A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications34(1), pp.1-11.

Von Solms, R. and Van Niekerk, J., (2013) From information security to cyber security. computers & security38, pp.97-102.

Leave a Comment