The general data security related to an
ethical and challenging issue yet to be resolved. An understanding and
intellectual ways framework should be followed to imply to the principles of
security. With time it is still far to
approach and to knock the gateways of General Data protection. Regulation community
feedback is encouraged to seek the group ascent’s effort, and with the help of
many researchers, proper guidance and rules should be followed. Definitely, for
resolving the problems, researchers play an important role to create a
framework for understanding and applying ethical principles in network and
security research (Kenneally, Bailey, & Maughan,
2010).
There is a necessity to exhibit many
principles that would really impact data security or data protection. Foremost
important principle to secure the data is the processing of personal data to
become fairly, and transparently. The reason for loyalty meets the following
standards up to the mark. Moreover, data should be very clearly outlined and never
try to take irrelevant information.
In addition, impacts on security should be
adequate and irrelevant data should be omitted. The most critical issue
regarding security is the retaining of data for a longer period of time. Practically,
the best practice to secure the essential document is to archive or delete it
to prevent from being hacked or other unethical issues. More obvious is to copy
of the information, especially which is stored. The impacts on data security are
critical as information security brings out the news headlines (Knapp,
Marshall, Rainer, & Ford, 2006). So, underestimation
of proper security procedures cannot be analyzed. The other factor is the
principle for international business. This data can be recorded and individual
is allowed to inform if data is sent to other resources such as the European
Economic Area. But surely for the transfer of these documents, it has to make
sure that data is sent safely. This relies on proper communication skills and
acceptance.
The impacts after understanding the
principles play an important role because true business sense and strategies are
evaluated, while moving to an organization which should be very specific and
open on how they select and get the authentic data. After selection of
authentic data, they should not send the original data and keep it to
themselves. Personal data should be used by the organization. A company should
not use prominent documents for the other companies to play its part. (Cárdenas,
Manadhata, & Rajan, 2013)
The principle of least privilege (POLP) is
applicable in all data security systems. POLP is relevant for end-users, IT
environment, applications, databases, processes, and systems. POLP sometimes
fails in the system because of which security threats get the increase. For
instance, in user account supported with the principle of least privilege
employees need to have the capability to work on databases for entering,
recording, storing, and managing important information. In case, employee’s
computer gets infected by the phishing e-mail or malware attack than in such
condition attack and its impact would only influence the database entries of
employee’s computer. Somehow, it would not spread system wide because of root
access privileges. Furthermore, employees performing unique tasks follows the
least privilege principles in MySQL setups particularly when tasks relates to
several different accounts. Thus in case, an attacker exploits the form when he
would have only power to manipulate and sort already recorded information by
that particular account. In such situation principle of least privilege will
protect all other important data from external attackers. Thus, attackers would
not be able to delete or change the information in the entire database. The other important prospects to ponder upon
that sensitive data is being evaluated by biometric information and through the
key approaches to genetic. Due to there is a need for specific centers in which
these kinds of information to be analyzed. Because of the requisition of best
possible care, therefore, the impacts are to be considered dramatically. The
crucial step about unawareness is privacy, and this privacy notices how the
information is utilized. Here the situation becomes harness because the
individual should have the right to inform where its data is being used. (Jøsang,
AlFayyadh, Grandison, AlZomai, & McNamara, 2007)
So a reasonable action is needed to be kept
in which information is added up or change. And the data should be protected by
the companies and organizations to keep privacies. (Richards
& King, 2014)
The principle of least privilege (POLP) is
applicable in all data security systems. POLP is relevant for end-users, IT
environment, applications, information databases, processes, and systems. POLP
sometimes fails in the system because of which security threats get the
increase. For instance, in user account supported with the principle of least
privilege employees need to have the capability to work on databases for
entering, recording, storing, and managing important information. In case,
employee’s computer gets infected by the phishing e-mail or malware attack than
in such condition attack and its impact would only influence the database
entries of employee’s computer (Lord, 2018). Somehow, it would
not spread system wide because of root access privileges. Furthermore,
employees performing unique tasks follows the least privilege principles in
MySQL setups particularly when tasks relates to several different accounts.
Thus in case, an attacker exploits the form when he would have only power to
manipulate and sort already recorded information by that particular account. In
such situation principle of least privilege will protect all other important
data from external attackers. Thus, attackers would not be able to delete or change
the information in the entire database.
References of Principles of impact on
security
Cárdenas, A.
A., Manadhata, P. K., & Rajan, S. P. (2013). Big data analytics for
security. IEEE Security & Privacy, 11( 6), 74-76.
Jøsang, A., AlFayyadh, B.,
Grandison, T., AlZomai, M., & McNamara, J. (2007). Security usability
principles for vulnerability analysis and risk assessment.
Twenty-Third
Annual Computer Security Applications Conference (ACSAC 2007) , 269-278.
Kenneally, E., Bailey, M.,
& Maughan, D. (2010). A framework for understanding and applying ethical
principles in network and security research.
International Conference on
Financial Cryptography and Data Security, 240-246.
Knapp, K. J., Marshall, T.
E., Rainer, R. K., & Ford, F. N. (2006). Information security: management's
effect on culture and policy. Information Management &
Computer Security,
24-36.
Lord, N. (2018). What is
the Principle of Least Privilege (POLP)? A Best Practice for Information
Security and Compliance. Retrieved from digitalguardian.com:
https://digitalguardian.com/blog/what-principle-least-privilege-polp-best-practice-information-security-and-compliance
Richards, N. M., & King,
J. H. (2014). Big data ethics.