Question

In: Computer Science

So far in this course, we’ve discussed the concepts of risk, security controls, and the value...

  1. So far in this course, we’ve discussed the concepts of risk, security controls, and the value of addressing security early and throughout the development lifecycle of systems. We’ve also discussed different threats to those systems, which can result (and have resulted!) in breaches of our data. Though cybercrime laws and regulations are trying to catch up with the changing technology landscape, there are increasing concerns over our ability to retain some degree of personal privacy. For this question, and using concepts covered in this course, give your opinion of the role of information security in the protection of personal privacy in the age of big data. Consider the tension between information security requiring the loss of privacy to be effective and the power of security controls for maintaining confidentiality. You are not expected to solve this problem but provide your thoughts, supported by class content.

Solutions

Expert Solution

Dealing with big data clearly implicate privacy concerns. The tasks of ensuring data security and protecting privacy become harder as information is multiplied and shared ever more widely around the world. . The Internet has become a necessary tool for modern people to process data, communicate and work.

In business, personal information can be accurately recorded and stored. For example, the name, time, and place of the goods purchased by the consumer will be preserved. In the medical field, personalized treatment can be achieved through the recording of personal information.

So how to protect individual privacy becomes a serious question nowadays. To a certain extent, privacy is no longer private.

  • Data storage is no longer suitable for a big data environment, and the risk of data leakage is increasing.
  • In the big data environment, people will have multiple accounts to experience various tools. However, some websites cannot effectively protect users' data because of their poor technical ability.
  • Many Internet users to obtain some merchant's interests, when registered membership will give their name, phone number, occupation, family address, and even personal information such as credit CARDS information to fill in, there is no ego to protect consciousness. The results are likely to be exploited by criminals, and the cases of fraud are common
  • The QR code is widely used in various applications because of its simple and unique characteristics of identifying objects. But many people use mobile phones to scan unknown QR code images for the sake of illegal benefits.When a user literally scans to identify a QR code, could open a Trojan program, or a phishing site, the mobile phone will be invaded by a virus, access to personal information will be a virus, then uploaded even sent directly to the criminals of the server.

These are some examples of possible data disclosure. The advent of the era of big data has greatly promoted the development of society, but at the same time, the cause of the information security problem has been very anxious, so we urgently need a new mechanism to protect personal privacy. The protection of personal information security needs to be done in many ways, with a maximum limit to reduce the risk of personal information leakage, to better protect the security of the Internet information, promote the economic development of our country.


Related Solutions

Choose any topic that we’ve covered thus far in the course (Canadian Legislation, Policies and Procedures,...
Choose any topic that we’ve covered thus far in the course (Canadian Legislation, Policies and Procedures, HR Metrics and Analytics, Progressive Discipline and Performance Management, Organizational Strategy, or Coaching and Mentoring) and write a minimum of 2 pages on your learning or how it applies to your future career. This paper is meant as a check-in to see how you are absorbing the course material, similarities and differences to previous learning and how you feel it supports your future growth...
Classify the types of financial institutions mentioned in the content of the course so far, as...
Classify the types of financial institutions mentioned in the content of the course so far, as either depository or nondepository. Explain the general difference between depository and nondepository institution sources of funds. It is often stated that all types of financial institutions have begun to offer services that were previously offered only by certain types. Consequently, many financial institutions are becoming more similar. Nevertheless, performance levels still differ significantly among types of financial institutions. Why?
Reflect on and relate to what you have learned so far in the course with respect...
Reflect on and relate to what you have learned so far in the course with respect to your ability to calculate gross domestic product and its impact on the economy’s business cycle, unemployment, and inflation; using gross domestic product formulate recommendations for a government’s role in achieving full employment in an economy.
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls.
Security Mitigation Plan discuss the following Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls. Create password policies. Document administrator roles and responsibilities. Document user roles and responsibilities. Determine authentication strategy. Determine intrusion detection and monitoring strategy. Determine virus detection strategies and protection. Create auditing policies and procedures. Develop education plan for employees on security protocols and appropriate use. Provide risk response. Avoidance Transference Mitigation Acceptance Address change Management/Version Control. Outline acceptable use of organizational assets and data. Present employee policies (separation of duties/training). Explain incident response. Incident types/category definitions Roles and responsibilities Reporting requirements/escalation Cyber-incident response...
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls....
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls. Create password policies. Document administrator roles and responsibilities. Document user roles and responsibilities. Determine an authentication strategy. Determine an intrusion detection and monitoring strategy. Determine virus detection strategies and protection. Create auditing policies and procedures.
Think about the concepts of risk which are part of this section of the course in...
Think about the concepts of risk which are part of this section of the course in the context of the size of a firm. Would these change if the firm were large? Small? Medium-sized? Why or why not? Provide an example in your post to add some specificity to your ideas. ( This Chapter is mainly on Risk & Cost of Capital in terms of corporate finance.)
1.Using the concepts of producer theory in which firms maximize profit as discussed in the course...
1.Using the concepts of producer theory in which firms maximize profit as discussed in the course materials, explain how perfectly competitive firms maximize profit in the short run versus in the long run. 2.Explain how the level of competition and anti-trust regulation affect firm decision making and markets?
For one important and interesting idea that you have learned so far in the course based,...
For one important and interesting idea that you have learned so far in the course based, write a one page essay beginning with the following statements: Although before this class I believed …….., in fact……..Or, Although it is tempting to believe……., in fact…..Or, Although it might seem that …………… is true, in fact…… Then explain why you or others could believe the idea that is fact incorrect. In other words, what is logical or compelling about this incorrect idea. Then...
Which, if any, of the immunoassays we have discussed so far, have you used? What did...
Which, if any, of the immunoassays we have discussed so far, have you used? What did you like about them, or dislike? If you haven’t used any so far, can you describe the methodology of some over the counter tests such as a home pregnancy test?
The capital budgeting decision techniques discussed so far all have strengths and weaknesses; however, they do...
The capital budgeting decision techniques discussed so far all have strengths and weaknesses; however, they do comprise the most popular rules for valuing projects. On the other hand, valuing an entire business requires that some adjustments be made to various pieces of these methodologies. As an example, in valuing a business, one frequently used alternative to Net Present Value (NPV) is called Adjusted Present Value (APV). Research other popular business valuation models. In 600-700 content words, respond to the following:...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT