Preview

Data security and leakage prevention systems

Better Essays
Open Document
Open Document
1700 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data security and leakage prevention systems
Data Security and Leakage Preventive Solutions
Darshana Esajenith Samaranayake
Student ID: 110390
Wilmington University

Abstract Many companies keep sensitive personal information about customers or employees in their files or on their network. Those information move fast through the systems and make easier for organizations to provide efficient and effect full service to the customers. Security of the information is one of the most concern aspects in information systems as it has become a major threat embedded with the information systems today. Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data. In this article, it describes the data security, data breaches and as well as the existing solutions for prevent the security issues and vulnerabilities.

Data Security and Leakage Preventive Solutions
Information has become one of the most important assets in this century, as people, systems, transactions and almost everything have linked each other and share information through the internet. Both public and private organizations and as well as the individuals adopt to manage and share data through the information systems as it is the most efficient and convenient way to do the transactions. However, as far as people depend on the information, they rely on the information systems too. Information systems have more popular among the people, because those systems ensure higher availability of data, accuracy, authenticity, integrity and confidentiality. Therefore information and information systems have become one of the major need of the society as never before.
When people more depend on the information systems, people have been experienced some security problems with information systems. Because some other systems are being developed to breach the information from those systems and people use them in



References: 1. The Top 5 Internal Security Threats - IT Security. 2014. [ONLINE] Available at:http://www.itsecurity.com/features/the-top-5-internal-security-threats-041207/ 2. Security special report: The internal threat. 2014. [ONLINE] Available at: http://www.computerweekly.com/feature/Security-special-report-The-internal-threat 3. The top five internal security threats | ZDNet. 2014. [ONLINE] Available at: http://www.zdnet.com/the-top-five-internal-security-threats-3039363097/

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Liaskos, J., & Sandy, G. A. (2004). An evaluation of Internet use policies of Victorian local…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    MIS

    • 541 Words
    • 2 Pages

    -Because Information System is not only about software and hardware, it should also consist people ware to give information/data to be process.…

    • 541 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Privacy Concern in Ict

    • 1092 Words
    • 5 Pages

    Information Computer Technology has already played an important role in people’s daily lives. It is widely used in information gathering, communication and mutual operation. Modern people have been benefited from more efficient information flow, less cost and faster communication. However, every coin has both sides. ICT also has brought people’s lives some concerning issues at the same time along with advantages.…

    • 1092 Words
    • 5 Pages
    Better Essays
  • Best Essays

    After examination of the report it is recommended that the revising the information system is necessary to accomplish the desired targets of the company. The information system used is very simple and there is no integration with every level of decision making. Also it is noticed proper steps are not employed for appropriate security for the sensitive data of the company.…

    • 2880 Words
    • 12 Pages
    Best Essays
  • Better Essays

    Use of It in Modern World

    • 1004 Words
    • 5 Pages

    Today, computer has become an important part of day-to-day life. Most human activities take place with the aid of ICT. It gives more effective and speedy solutions to real life problems. People lead complex lifestyles that need…

    • 1004 Words
    • 5 Pages
    Better Essays
  • Best Essays

    information system noor band

    • 2939 Words
    • 11 Pages

    This is the noble role of Information Systems (IS). Information Systems according to O’Brien (2003) is the study of the interrelations between hardware and software that the organization and the people comprising it to collect, process, create or distribute valuable data. Put differently, information system involves the analysis and design of computer networking, network design, information security and decision support system. In a nutshell, an organization must have a good grasp of the importance of Information Systems to attend to the information needs of the organization’s…

    • 2939 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Miss

    • 459 Words
    • 2 Pages

    (iii) Clearly explain which one of the Information Systems you mentioned is the most important. (5 marks)…

    • 459 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Alumni Information System

    • 894 Words
    • 4 Pages

    As this technology age, information is needed in every field of human’s life which supports the computerization of information where it is knowledge communication in a timely, accurate, understandable, fashion and extracted or distilled from data and system is a set of independent entities, real or abstract forming an integrated whole. In this era, where advancement has become the part of the each and every field of life and time become the one of the important of the success we want to do things and everyday jobs faster ever. Dealing with large amount of data in a manual way will make things complicated that will result in data lost. The role of information system can’t be ignored doing things faster, doing things better and doing things smarter, all those traits are possible just because of two words, Information System.…

    • 894 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Systems

    • 396 Words
    • 2 Pages

    The specific role of the information systems as it relates to any organization is the ability to reach and respond on demand, in-real time and from a distance. It also influenced competitive strategies, the efficiency of operations, improve organizational performance, business processes, relationships with customers and other limitless possibilities in with an organization can run or operate. Some of the newly developed information systems help make changes in marketing, operations, e-commerce, logistics, human resources, finance and accounting. So in retrospect, an information system has more than one specific role in regards to how it plays in an organization.…

    • 396 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Computer

    • 337 Words
    • 1 Page

    Nowadays, the information science is more and more developed. People always want to communicate with others all around the world. As a result, computer…………………………………………………………………………………………………………………….....We are able to do a lot of things faster thanks to computer, but there are some disadvantages of overusing. The following essay will discuss the advantages and disadvantages of this issue.…

    • 337 Words
    • 1 Page
    Satisfactory Essays