Data Security And Privacy Essay

PAGES
2
WORDS
649
Cite

¶ … Security and Privacy Five Central Concerns About Data Security and Privacy

The five central concerns about data security and privacy that are the most common in personal and business use of computers are presented in this paper. Password security, the need companies have to keep their employees up-to-date with security training, and defining checks and balances to make sure information is not compromised are the three most important according to research. Website security and giving website users the option of defining privacy settings are also very important (Casal, Flavian, Guinaliu, 2007).

Five Central Concerns About Data Security and Privacy

The most common way a computer system is broken into is when a hacker, thief or dishonest person gets a password and uses it to get unauthorized information. Passwords are often very simple, with "123" or "password" being used the most often. This is why many security training programs will always tell users to change their passwords from the system password (Landau, 2008). Many people use their pet's names and passwords, which provides their friends and people they know them with quick access to their systems as well. There are also specialized computer...

...

A key logger program will capture passwords into a special file that a hacker or thief can get to at a later time, and immediately know how to get into a computer system.
The second concern regarding data security and privacy is the lack of security training many companies do. From researching this topic, it appears the bigger a company is, the more they ignore security training (Landau, 2008). It's because many of these very large companies are too busy to do training and expect their employees to already know a lot about security. This however doesn't work out as many examples of company-wide break-ins have shown.

A third area of data security and privacy are the checks and balances needed to make sure private, highly valuable and confidential data stays safe in a company. These checks and balances are the sign-offs and approvals needed to keep data safe for years, only accessible by those that need to get access to it. Checks and balances force companies to make sure people responsible for their data are accessing and using it in a secure way.

The fourth area of data security and privacy is the protection of websites. This area gets a lot…

Sources Used in Documents:

Bibliography

Casal, L.V., Carlos Flavian, & Miguel Guinaliu. (2007) The role of security, privacy, usability and reputation in the development of online banking. Online Information Review, 31(5), 583.

Link:

http://phr-adoptionresearch.wikispaces.com/file/view/The+role+of+security,+privacy,+usability+and+reputation+in+the+development+of+online+banking.pdf

Landau, S. (2008). Privacy and security A multidimensional problem. Association for Computing Machinery. Communications of the ACM, 51(11), 25.
Link: http://www.privacyink.org/html/multidimensional.pdf


Cite this Document:

"Data Security And Privacy" (2013, November 11) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/data-security-and-privacy-126877

"Data Security And Privacy" 11 November 2013. Web.24 April. 2024. <
https://www.paperdue.com/essay/data-security-and-privacy-126877>

"Data Security And Privacy", 11 November 2013, Accessed.24 April. 2024,
https://www.paperdue.com/essay/data-security-and-privacy-126877

Related Documents

Security Privacy In health care, the protection of confidential patient information is an important key in to addressing critical issues and safeguarding the privacy of the individual. To provide more guidance are federal guidelines such as: the Health Care Insurance Affordability and Accountability Act (HIPPA). On the surface, all facilities are supposed to have procedures in place for discarding these kinds of materials. ("Summary of HIPPA Privacy Rule," 2102) In the case

However, this still relatively young application of internet technology does come with a wide array of security concerns that highlight the ethical and legal responsibilities facing these handlers of sensitive information. With identify theft and hacking of open source network activities real threats in the internet age, it is increasingly important for online shoppers bankers to be aware of the risks and for online financial institutions to be armed to

Company's Data Needs Data protection is an important aspect of modern day businesses and organizations because data is the lifeblood of their business and operations. Some of the major examples of a company's data include financial information, legal records, and customer information. Given the significance of this type of information, it is increasingly critical for a company to protect its data in order to guarantee successful operations. In the recent past,

Internet Risk and Cybercrime at the U.S. Department of Veterans Affairs Internet Risk Cybercrime Today, the mission of the U.S. Department of Veterans Affairs (VA) as taken from President Lincoln's second inaugural address is, "To care for him who shall have borne the battle, and for his widow, and his orphan." To this end, this cabinet-level organization provides healthcare services through the Veterans Health Administration (VHA) to nine million veteran patients each year.

What are the risks of copying the database to the laptop and taking it home or on a trip?The most obvious risk associated with copying the database to her laptop are related to security. Here, here laptop may not have the same security provision as the retail company that employs her. Likewise, data during the transfer process can be compromised depending on when and where she conducts the transfer. For

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to