Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Essay on Principles of impact on security

Category: Financial Risk Management Paper Type: Essay Writing Reference: APA Words: 1100

The general data security related to an ethical and challenging issue yet to be resolved. An understanding and intellectual ways framework should be followed to imply to the principles of security.  With time it is still far to approach and to knock the gateways of General Data protection. Regulation community feedback is encouraged to seek the group ascent’s effort, and with the help of many researchers, proper guidance and rules should be followed. Definitely, for resolving the problems, researchers play an important role to create a framework for understanding and applying ethical principles in network and security research (Kenneally, Bailey, & Maughan, 2010).

There is a necessity to exhibit many principles that would really impact data security or data protection. Foremost important principle to secure the data is the processing of personal data to become fairly, and transparently. The reason for loyalty meets the following standards up to the mark. Moreover, data should be very clearly outlined and never try to take irrelevant information.

In addition, impacts on security should be adequate and irrelevant data should be omitted. The most critical issue regarding security is the retaining of data for a longer period of time. Practically, the best practice to secure the essential document is to archive or delete it to prevent from being hacked or other unethical issues. More obvious is to copy of the information, especially which is stored. The impacts on data security are critical as information security brings out the news headlines (Knapp, Marshall, Rainer, & Ford, 2006). So, underestimation of proper security procedures cannot be analyzed. The other factor is the principle for international business. This data can be recorded and individual is allowed to inform if data is sent to other resources such as the European Economic Area. But surely for the transfer of these documents, it has to make sure that data is sent safely. This relies on proper communication skills and acceptance.

The impacts after understanding the principles play an important role because true business sense and strategies are evaluated, while moving to an organization which should be very specific and open on how they select and get the authentic data. After selection of authentic data, they should not send the original data and keep it to themselves. Personal data should be used by the organization. A company should not use prominent documents for the other companies to play its part. (Cárdenas, Manadhata, & Rajan, 2013)

The principle of least privilege (POLP) is applicable in all data security systems. POLP is relevant for end-users, IT environment, applications, databases, processes, and systems. POLP sometimes fails in the system because of which security threats get the increase. For instance, in user account supported with the principle of least privilege employees need to have the capability to work on databases for entering, recording, storing, and managing important information. In case, employee’s computer gets infected by the phishing e-mail or malware attack than in such condition attack and its impact would only influence the database entries of employee’s computer. Somehow, it would not spread system wide because of root access privileges. Furthermore, employees performing unique tasks follows the least privilege principles in MySQL setups particularly when tasks relates to several different accounts. Thus in case, an attacker exploits the form when he would have only power to manipulate and sort already recorded information by that particular account. In such situation principle of least privilege will protect all other important data from external attackers. Thus, attackers would not be able to delete or change the information in the entire database.  The other important prospects to ponder upon that sensitive data is being evaluated by biometric information and through the key approaches to genetic. Due to there is a need for specific centers in which these kinds of information to be analyzed. Because of the requisition of best possible care, therefore, the impacts are to be considered dramatically. The crucial step about unawareness is privacy, and this privacy notices how the information is utilized. Here the situation becomes harness because the individual should have the right to inform where its data is being used. (Jøsang, AlFayyadh, Grandison, AlZomai, & McNamara, 2007)

So a reasonable action is needed to be kept in which information is added up or change. And the data should be protected by the companies and organizations to keep privacies. (Richards & King, 2014)

The principle of least privilege (POLP) is applicable in all data security systems. POLP is relevant for end-users, IT environment, applications, information databases, processes, and systems. POLP sometimes fails in the system because of which security threats get the increase. For instance, in user account supported with the principle of least privilege employees need to have the capability to work on databases for entering, recording, storing, and managing important information. In case, employee’s computer gets infected by the phishing e-mail or malware attack than in such condition attack and its impact would only influence the database entries of employee’s computer (Lord, 2018). Somehow, it would not spread system wide because of root access privileges. Furthermore, employees performing unique tasks follows the least privilege principles in MySQL setups particularly when tasks relates to several different accounts. Thus in case, an attacker exploits the form when he would have only power to manipulate and sort already recorded information by that particular account. In such situation principle of least privilege will protect all other important data from external attackers. Thus, attackers would not be able to delete or change the information in the entire database. 

References of Principles of impact on security

Cárdenas, A. A., Manadhata, P. K., & Rajan, S. P. (2013). Big data analytics for security. IEEE Security & Privacy, 11( 6), 74-76.

Jøsang, A., AlFayyadh, B., Grandison, T., AlZomai, M., & McNamara, J. (2007). Security usability principles for vulnerability analysis and risk assessment.

Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) , 269-278.

Kenneally, E., Bailey, M., & Maughan, D. (2010). A framework for understanding and applying ethical principles in network and security research.

International Conference on Financial Cryptography and Data Security, 240-246.

Knapp, K. J., Marshall, T. E., Rainer, R. K., & Ford, F. N. (2006). Information security: management's effect on culture and policy. Information Management &

Computer Security, 24-36.

Lord, N. (2018). What is the Principle of Least Privilege (POLP)? A Best Practice for Information Security and Compliance. Retrieved from digitalguardian.com: https://digitalguardian.com/blog/what-principle-least-privilege-polp-best-practice-information-security-and-compliance

Richards, N. M., & King, J. H. (2014). Big data ethics.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed