Darshana Esajenith Samaranayake
Student ID: 110390
Wilmington University
Abstract Many companies keep sensitive personal information about customers or employees in their files or on their network. Those information move fast through the systems and make easier for organizations to provide efficient and effect full service to the customers. Security of the information is one of the most concern aspects in information systems as it has become a major threat embedded with the information systems today. Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data. In this article, it describes the data security, data breaches and as well as the existing solutions for prevent the security issues and vulnerabilities.
Data Security and Leakage Preventive Solutions
Information has become one of the most important assets in this century, as people, systems, transactions and almost everything have linked each other and share information through the internet. Both public and private organizations and as well as the individuals adopt to manage and share data through the information systems as it is the most efficient and convenient way to do the transactions. However, as far as people depend on the information, they rely on the information systems too. Information systems have more popular among the people, because those systems ensure higher availability of data, accuracy, authenticity, integrity and confidentiality. Therefore information and information systems have become one of the major need of the society as never before.
When people more depend on the information systems, people have been experienced some security problems with information systems. Because some other systems are being developed to breach the information from those systems and people use them in
References: 1. The Top 5 Internal Security Threats - IT Security. 2014. [ONLINE] Available at:http://www.itsecurity.com/features/the-top-5-internal-security-threats-041207/ 2. Security special report: The internal threat. 2014. [ONLINE] Available at: http://www.computerweekly.com/feature/Security-special-report-The-internal-threat 3. The top five internal security threats | ZDNet. 2014. [ONLINE] Available at: http://www.zdnet.com/the-top-five-internal-security-threats-3039363097/