Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Web and Data security

Author: Janet Peter
by Janet Peter
Posted: Jan 25, 2019
data information

Abstract

The research paper contains the information related the upcoming trend in the mobile devices. The documents discuss the different trends in the field of mobile devices technology that affect the security issues. The paper also views the strategies applied in ensuring the data, and information is secure. The paper discusses the approaches applied in maintaining data and information confidentiality and integrity. The document mentions the various ways of bleaching the data integrity and data confidentiality.

Introduction

The trends in the growth and development of technology have led to invention of different computerized devices. The developers and manufactures are focusing on development of devices that meet the user requirement and reference. The manufacturers of the computer devices concentrate on the implementation of taste and preference as demanded yin the market. The factors considered in the development of the current technological devices include the portability, weight and size of the devices. The technology has introduced the wearable devices to include the ease of application and cognitive nature of the end user. The ease of use and the portable characteristics has enhances the easier operation of business transactions and the business activities. However, the portability traits of the computer devices have led to the bleaching of information security and confidentiality. The portability nature has affected the dissemination of the information.

The Trend in the of Security in Mobile Devices

The issue of data and information leakage is one the major issues linked to the mobile devices. Storing of data and information in the portable device makes the data and information accessible to the unauthorized users. Transferring the sensitive data and information in the mobile devices may contribute to the dissemination of the information to the unauthorized people hence bleaching the privacy and the confidentiality of the data and information owners. The portable devices cause’ data and information leakage incase the device got lost. The rights and freedom of privacy have encountered violation following the accumulated practices of keeping data in the portable devices. The portable devices have also contributed to the violation of the rights and freedom of data and information confidentiality (Janczewski, L. (2000). The data carried with the mobile device has a high risk of falling into the hands of the third party via stealing of the device. The mobile devices have formed the new network mediums. The traditional security applied to the organizational network through the installation of the firewalls has no implementation on the mobile devices.

Organizations implement policies that require the employees to encrypt the sensitive data stored on mobile devices like the laptops and the handheld devices. However, the encryption of data and information may not have implementation by every individual. Failure to encrypt data and information in the handheld devices makes the information susceptible to theft. Currently, organization implements the remote control of the handheld devices. In case the mobile device encounter event of getting lost or stolen the organization has the capability of accessing the device remotely. The organization wipes out the device to remove the sensitive data. Currently, the mobile devices have configurations and settings such that the managers can have the mobile restored to factory default remotely. Currently, the lost mobile devices have a tracing mechanism used to locate the mobile device when stolen.

Currently, the organization implements the Virtual Local Area Network (VLAN) to connect the mobile devices to the organization network servers (Ferrari & Thuraisingham, 2006). The operations performed by the employees in the firm must have encryption to avoid the interception of the data and information on transit via the network. The setting of the securing parameters among the mobile devices varies accordingly. Organization implements the use of the password, pin and the accounts on the mobile devices (Ma, & Tsai, 2006). However, for secure methods the mobile devices should have strong password, personal identification number and complex algorithms to access the utilities of the mobile device. The operating systems of the mobile devices have greatly improved on the security issues. The applications of the complex operating systems that reduce the chances of encountering the risk promote the facts of having secure operations.

The Data and Information Confidentiality

Data and information confidentiality refers to the methodologies applied to ensure the sensitive information has no access to unauthorized individuals or the systems (Gutmann, Stern, & National Research Council (U.S.). 2007). The confidentiality of data and information has enforcement via the implementation of the personal identification number and the unique cards. The authentication and the verification parameters have application to allow the user of a particular system gain access to the facilities of the system. The users may have personal accounts in the system secured with password and user name. The system database may use the cards and secret codes to gain access to the database information related to the user. The biological traits have usage in the as the authentication and the verification parameters. The biometric features are the unique traits that identify a particular individual. The parts of the body that enforce the data and information confidentiality include the pupil of the eye, the retina, the finger prints, the voice recognition and the face symmetry.

The breaches of confidentiality occur when an unauthorized person gets access to the card and the personal identification number. When people access the private and confidential information through looking via the computer screen is bleach to confidentiality. When device containing private and confidential information get lost or get sold to the third party without removing data and information kids bleach to the confidentiality. Disseminating private and confidential information to the unauthorized parties through the phone or the social media is bleaching the data and information confidentiality (Gutmann, Stern, & National Research Council (U.S.). 2007).

The Data and Information Integrity

The data and the information integrity refer to the fact that the data and information cannot have modification without the authorization (Wadhwa, Hussain, & Rizvi, (2013). The data and information integrity has maintenance via ensuring that the users of the system and the employees have a personal account. The accounts have maintenance via the use of the passwords and the user name. The password acts as the verification parameter while the user name acts as the validation parameters. Both the username and the password uniquely identify the owner of the account.

The data and the information integrity have violation when the employee or the user of the system accidentally or intentionally deletes information within the system. The data and information have violation when the computer virus affects the data and information leading to loss of data and information, delete of the files and the modification of the file formats. The data and information encounter violation via the modification of vital information like the alteration of the employee salary in the database server. The actions involving the intruders and the hackers accessing the system is bleaching of the data and information integrity (Ferrari & Thuraisingham, 2006). The operations of manipulating information by the hackers and the intruders lead to the violation of the data and the information. The vandalizing acts caused by those in high authority like the government officials, the system administrator, and manager is the acts of bleaching data and information integrity. The nonmalicious acts that lead to the violation of data and information integrity include the mistyping of data for a particular transaction. When data has successfully saved with errors is bleaching the data integrity. When the database performs the updating activities without the control, and the intervention of the database manager is a violation of the data integrity (Marti?nez-Pe?rez, et.al 2015).

Conclusion

The dissemination of data and information using the mobile devices is risking the operations of the organization. The organization should enforce the handheld policies that govern the sharing of data and information concerning the organization. The new technological techniques like the remote access of the mobile devices should have application to control the access of information in case device gets lost. The organization should evaluate and ensure that the data and information transferred via the portable devices have undergone the encryption process. The mobile devices have highest levels of breaching the confidentiality and integrity characteristics of the secure data. The small size of the portable devices makes them easier and prone to snatching, pick pocketing and falling off.

References

Ferrari, E., & Thuraisingham, B. M. (2006). Web and information security. Hershey, PA: IRM press.

Gutmann, M. P., Stern, P. C., & National Research Council (U.S.). (2007). Putting people on the map: Protecting confidentiality with linked social-spatial data. Washington, D.C: National Academies Press.

Janczewski, L. (2000). Internet and intranet security management: Risks and solutions. Hershey,PA: Idea Group Pub.

Ma, L., & Tsai, J. J.-P. (2006). Security modeling and analysis of mobile agent systems. London: Imperial College Press

Marti?nez-Pe?rez, B., de,. T.-D. I., & Lo?pez-Coronado, M. (2015). Privacy and Security in Mobile Health Apps: A Review and Recommendations. Journal of Medical Systems, 39, 1, 1-8.

Wadhwa, N., Hussain, S. Z., & Rizvi, S. A. M.,(2013). A combined method for confidentiality, integrity, availability and authentication (CMCIAA). Lecture Notes in Engineering and Computer Science, 1254-1257.

Sherry Roberts is the author of this paper. A senior editor at Melda Research in nursing paper writing service if you need a similar paper you can place your order for a custom research paper from legitimate research paper writing services.

About the Author

"Janet Peter is the Managing Director of a globally competitive essay writing company.

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Janet Peter
Premium Member

Janet Peter

Member since: Dec 11, 2017
Published articles: 349

Related Articles