Question

In: Computer Science

M11 Discussion - Data Security Data security is a concern every day for information technology professionals....

M11 Discussion - Data Security

Data security is a concern every day for information technology professionals. Users, even information technology professionals move data from point to point on a regular basis and often this requires some form of mobility. For this discussion, please address the points listed below. If you use web sources, include the complete URL to the article.

  • Think about your normal day. Describe how you use your smartphone, table, or laptop away from your home or office.
  • Now, refect on the possible areas in which your data could be breached, reviewed, copied, or stolen.
  • If you were an information technology professional, what are some of the things you would do to help prevent such data breaches?

Each student will be responsible for responding to the discussion question by Wednesday with a word count of at least 250 words.

Solutions

Expert Solution

PRIVACY has become a big question in today’s internet world. Recent surveys say that more than 80% of the user’s searches have been captured and made use of it to improve the business and strategies. If I search for something in search engines, I keep getting advertisements, pop-ups in external applications installed on my mobile phone. How do other applications know what I searched for in some other search engine? Is everything interconnected and interlinked? These questions will come up in the mind.

The website keeps tracks of user's interests for business decision making. It keeps the track of what items you search, the price range, the brand and so on. Once it gets all the necessary history details, it tries to provide suggestions to the user.

On the background there are many algorithms are running which are processing your inputs and providing smart suggestions. These techniques are AI based. AI stands for Artificial Intelligence. It is one of the widely used techniques for making intelligent decisions which simulate human behavior in solving complex problems.

You would have seen when you purchase a mobile phone, you would have got suggestion stating to buy phone cover along with the phone with the tag 'People bought these items together' which is a data mining task. The browser or website history have enough information for the algorithms to perform classification of tasks. It is known as supervised learning technique in Machine Learning. The system understands your searching information and provides more accurate suggestions through Natural Language Processing and so on so forth.

The server or browser keeps track of this information and get it supplied as an input to AI algorithms for business decision making. How does my mobile application provides pop advertising know that you have been searching for the specific item?

There are different areas where our data breached based on the above situations. It can be from a website where we search queries, fill forms, submit it. It can be from malicious apps which we are not aware of in our smartphone.

If you were an information technology professional, what are some of the things you would do to help prevent such data breaches?
- Do not click suspicious links within the home network (Ex. HTTP, foreign/irrelevant website)
- Identify phishing websites
- Strengthen protocol security
- Update the systems regularly
- Incorporate high standard security mechanisms
- Protect the data
- Maintain the confidentiality
- Validate the data before sending to avoid SQL injection based attacks
- Do not grant unnecessary permissions to android applications


Related Solutions

The HIPAA Security Rule is a critical document for Health care Information Technology professionals to understand...
The HIPAA Security Rule is a critical document for Health care Information Technology professionals to understand and support. Review the HIPAA Security Rule and discuss: (1) importance of access controls in addition to audit controls, (2) what “emergency access procedures” mean under the Access Control standard, (3) how role-based access controls meet the HIPAA Privacy Rule Minimum Necessary standard, (4) what form of authentication best meets the Person or Entity Authentication standard for different healthcare applications.
Security should be a top concern for every network environment. This is especially true in a...
Security should be a top concern for every network environment. This is especially true in a converged network. Many mission-critical services depend on this infrastructure. A security breach could cause devastating effects on the environment. All measures must be taken to reduce the risk of a security breach. In 3–4 paragraphs, complete the following: Discuss 1 way to reduce risk in the network. Who do you think is responsible for keeping the network safe—the administrator, the users, or both? Why?
Security should be a top concern for every network environment. This is especially true in a...
Security should be a top concern for every network environment. This is especially true in a converged network. Many mission-critical services depend on this infrastructure. A security breach could cause devastating effects on the environment. All measures must be taken to reduce the risk of a security breach. In 3–4 paragraphs, complete the following: Discuss 1 way to reduce risk in the network. Who do you think is responsible for keeping the network safe—the administrator, the users, or both? Why?
Q1. Define information security Q2. Describe the information security roles of professionals within an organization
Q1. Define information securityQ2. Describe the information security roles of professionals within an organizationQ3. Explain these Necessary tools: policy, awareness, training, education, technologyQ4. Explain why a successful information security program is the responsibility of both an organization’s general management and IT managementQ5. Identify the threats posed to information security and differentiate threats to the information within systems from attacks against the information within systemsQ6. Differentiate between laws and ethicsQ7. Explain the role of culture as it applies to ethics in...
1.Information Technology leaders, including information assurance and security professionals, communicate through various channels including e-mails, texts,...
1.Information Technology leaders, including information assurance and security professionals, communicate through various channels including e-mails, texts, and social media. It is imperative that the IAS professional communicates in a concise, professional, and courteous manner. The tone of the communication impacts how the receiver interprets it. Based on the readings in this unit, you study the different aspects of planning and drafting message with an intended meaning. Employing an adaptive writing technique and use of positive and courteous tone and language...
Information Security as a concern is evolving. the basics in terms of concepts and what the...
Information Security as a concern is evolving. the basics in terms of concepts and what the bad guys can do and how. about the ethics associated and how the existence of the Internet challenges ethics. What are, in your opinion the major factors that will shape security and ethics associated with the Internet-over in the next 10 years? What and why do you think so?
Every day there are stories in the media related to security breaches, etc., in organisations and...
Every day there are stories in the media related to security breaches, etc., in organisations and their ramifications. The Security consultancy you work for has asked you, in your capacity as an IT Security Specialist, to design a Security Policy for the organisation
How do information technology professionals and everyone else differ in their ethics with respect to information...
How do information technology professionals and everyone else differ in their ethics with respect to information technology? Discuss differences if from both library resources and your opinion.
Technology is becoming more and more complicated every year. As technology becomes more complicated new security...
Technology is becoming more and more complicated every year. As technology becomes more complicated new security measures are required in order to protect individuals from theft. Most people do not understand how simple devices such as debit/card cards and online bill pay work, so how can they effectively protect themselves from theft. I believe we have reached a point in technology where most of our financial transactions are done over wire and not actually completed using tangible currency. In-fact only...
Threats are made against the nation and pose a security risk, every day, but the public...
Threats are made against the nation and pose a security risk, every day, but the public is not always aware of these threats. For this week’s discussion question respond to the following prompts: Examine whether it is ethical or not for the government to hold such information from private citizens or if citizens should know about any cyber-attacks against the nation. Identify any legal ramifications that could arise if citizens were aware of all cyber-attacks made against the nation.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT