blog




  • Essay / Online Data Privacy: Risk Analysis and Preventative Security Measures

    Table of ContentsPractices Used to Assess RiskThe Scope of Risk AssessmentUnintentional Human: or Human OccurrencePoints at Which Risk Should Be Assessed in a Network IT1. Using firewalls2. Antivirus SoftwareGroup PolicyThesis Statement: Big data can necessarily be supported by cloud computing along with all its computing needs. However, personalization information for big data can often be considered private, raising privacy concerns. Russom, P. (2011). Big data analysis. TDWI Best Practices Report, Fourth Quarter, 19, 40. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essayRussom, the director of TDWI, critically analyzed the essence of big data analytics by showing how it has evolved from a problem of concern to a highly competitive business opportunity. . It also outlines some fundamental assumptions supporting the application of advanced techniques to big data sets. Russon provides a credible report as it provides streaming and diversity of data providing logical insight into the personalization and privacy issues of Big Data. The source is relevant to the chosen topic of Big Data, as the report documents the background study of Big Data, thereby strengthening the argument on the personalization and privacy issues related to Big Data. Labrinidis, A. and Jagadish, HV (2012). Challenges and opportunities of Big Data. Proceedings of the VLDB Endowment, 5(12), 2032-2033.Labrinidis and Jagadish explore the controversies and highlight the certainties and uncertainties surrounding big data. In doing so, the authors draw wider recognition for data-driven decision-making. The credibility of the authors in presenting the challenges and opportunities of Big Data is highlighted in the article which includes the logical analysis of cloud computing offering a comprehensive platform for reviews and comparisons. Finally, Labrinidis and Jagadish's report offers great relevance in the study topic by proving the challenges of Big data as a possible underpinning while arguing between data privacy and personalization. Snijders, C., Matzat, U., & Reips, DU (2012). “Big Data”: Significant Knowledge Gaps in Internet Science. International Journal of Internet Science, 7(1), 1-5. Snijders, Matzat, and Reips, in their journal, take a close look at Big Data on Internet science through online networks pursuing the unique role of social scientists. The authors of the International Journal of Internet Science provide extensive information on Big Data analysis, documenting credible statistics and facts that are robust and relevant to the study of Big Data. Therefore, in relation to the topic of study, the review provides the basis for argumentation as all the facts of personalization are analyzed, which facilitates the reduction of privacy issues that come at a cost. It should therefore be emphasized that the review is relevant to the subject of study. Tene, O. and Polonetsky, J. (2012). Big data for everyone: Privacy and user control in the age of analytics. Nw. J.Tech. & Intel. Prop., 11, XXVII. Tene and Polonetsky's academic review examines privacy and user control of Big Data by providing assumptions and facts that do not threaten user privacy for a good social initiative. The authors' critical review provides detailed information on confidentiality which is theuser control, also demonstrating the credibility of their research and analysis. In doing so, Tene and Polonetsky guarantee a source of confidentiality and personalization of Big Data studies. Considering the topic of study, the argument between privacy and personalization is extensively researched in the journal of Tene and Polonetsky, which reinforces its relevance in the topic of study. Chen, H., Chiang, RH and Storey, VC (2012). Business intelligence and analytics: meaningful data with substantial impact. MISTrimestriel, 36(4).Chen, Chiang and Storey discussed business intelligence and analytics from the perspective of big data. The book reflects the scale and impact of interrelated data problems that demand solutions in the business environment. The academic authors, in this case, describe the evolution and implications of Big data from theoretical and business perspectives, while highlighting significant developments ensuring sincerity. Having an idea of ​​the growth and essential development of Big data from a substantial angle is indeed relevant to argue on the subject studied. Indeed, perfect information not only improves the meaning of the study document. Wang, Y., In Xiong, H., In Argamon, S., In Li, X.-Y. and In Li, JZ (2015). Big Data Computing and Communications: First International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015, Proceedings. The article documents the idea that the amount of data collected far exceeds what can be analyzed by individuals without assistance. This is due to the continued emergence of social sites such as Google, Yahoo and Facebook. The confidentiality and personalization aspect is widely covered and guarantees fewer threats. The credibility of the authors was highlighted during the international conference at the origin of the study. Since the central thesis of the research revolves around the privacy and personalization of big data, the source is relevant to the success of the study's argument because it provides literature on cloud computing that is important to the 'investigation. Crawford, K. and Schultz, J. (2014). Big data and due process: towards a framework for repairing predictive privacy breaches. BCL Rev., 55, 93. Crawford and Schultz address the privacy invasions caused by big data by providing an analysis of the reliable methods behind the underlying phenomena in the fields of engineering, science, and business as well . The credibility of informed sources has taken an important step in facilitating future studies through data mining, clustering, and predictive visualization. Therefore, in connection with the investigation, it should be emphasized that large-scale data optimization is relevant for achieving the study objectives, which also supports the research argument. McAfee, A., Brynjolfsson, E. and Davenport, TH (2012). Big data: the management revolution. Harvard business review, 90(10), 60-68. The book describes big data management regarding the issue of privacy and personalization and its importance in the discipline of computer science and technology. McAfee, Brynjolfsson, and Davenport have made the professional case for managing only measurable data as the basis for data privacy and personalization without any additional cost. The relevance of such credibility is significant in the application of Big Data in the scientific Internet, allowing interested customers to visit their online store without fearing for their privacy. With such a favorable argument, data encryption ensures user privacy and personalization. THESolutions to many challenging economic and social problems generally lie in a better understanding of data. Innovative strategies and tools for analyzing different sets of information should be revolutionized to improve the levels of big data protection signals. Big Data systems hold different potentials for innovation, ranging from improved healthcare services to a sterile environment as well as more brilliant marketing strategies. However, data privacy advocates are generally associated with the same advances, with a disruption of the connections between online data risks, preemptive security and prosecution manipulation, online data refinement, redlining, over-illegalization, as well as other forms of restricted online freedoms. (Russom, 2011). With the advent of the Internet, security levels must become a major concern; in addition, the safety assessment legalizes a better perception of the emergence of know-how in terms of safety. The web system itself has allowed various security terrorizations to occur. The structural design of the Internet, when customized, can reduce likely operational attacks via the network. Knowing the attack strategy allows the right security to come out. Various businesses protect themselves from the Internet through the use of firewalls as well as encryption mechanisms. Businesses have created an intranet to stay connected to the web while protecting them from possible terror. The entire field of Internet system security is huge and in the developing stage. The research sequence consists of a brief account dating back to the early stages of the Internet and the current progression of network security. To understand the current study, a basic knowledge of the web, its susceptibilities, Internet-based attack techniques and security technologies is essential and therefore should be analyzed. In previous years, the variety of risks faced by the computer network from sophisticated attackers have radically and transversally increased all community margins, leading to a difficult and profitable load on health and organization programs. This is due to the excess of current knowledge structures on the computer system, the rapid development of Internet service stations, common usage and the dissemination of facts. Now, making risk assessment an extremely critical issue in the equipment network. When it comes to statistics, there has been a shocking trend in the number of security levers such as economic deception, theft of proprietary figures, statistics or pure deception or intelligence, schemes (McAfee, 2012) . Computer programmers or rejection of facility outbreaks in many establishments in previous years; Many large companies have been significantly affected by these volatile IT security openings. Therefore, the main concern of any institute is the security of its statistics, so that it can meet the necessities of business transactions (information security). Confidentiality, honesty and accessibility, the value of information must be maintained. Thus, the possibility of deprivation (risk) in the workstation network of any business organization must be taken into account since the computer network creates a high value return for businesses. IT security is about using technology to do a job or task correctly, i.e. ensuring that the system works correctly. Security is the process that requires the contribution ofthe entire organization to be effective. Risk assessment means looking at each particular task and keeping in mind the safety system to accomplish it, this helps to be aware of the threats related to carrying out the work and taken into account. actions to prevent injuries. To assess risk, you must first identify the hazards (i.e. the tools, equipment, materials and work method); Second, decide who might be harmed and how. Additionally, assess the risk and put measures in place to control the risk. Furthermore, consider the results and apply them and finally, review the evaluation and modernize it if necessary. Risk assessment practice; In risk assessment, the sequence of actions to achieve a result includes: What valuable assets are used for the network (computers and trade secret information) What are the threats to the network (fraud, identity thieves and private workers ) ; could computer programmers suffer internal or external destruction? What are the network susceptibilities (infrastructure exposure?) Practices used to assess risks In previous years, many techniques have been applied to carry out risk assessment in computer network systems: National Method of standardization and technology, assessment and benchmarking of critical operational risks, assets and vulnerabilities. The National Institution for Standardization and Technology helps various establishments to develop, maintain and maintain standard processes of knowledge required to advance the quality of the products and services offered, guarantee the use of updated actions to achieve results, certify product reliability as well as promote rapid marketing growth. The latter is the method used to determine the implementation of the network supercomputer in an establishment. Benchmarking tools are a set of databases used to identify and evaluate its adoption, network properties, strategies as well as websites under particular conditions. Even more, the benchmark helps to standardize and improve perspective and firmness in the face of different speeds of hardware and software (valued resources). Furthermore, it is helpful to know how well an IT system can withstand demanding circumstances and also to know the position of specific challenges, which later helps in reducing the expenses related to repairing and updating the network. Network links, central processing unit function, server, and various parts of the computer network that can be measured or judged. The Range of Risk Assessment In businesses or establishments where data is produced on a daily basis, security The collection of statistics and information is the most essential major concern that needs to be given careful thought in order to to avoid any cybercriminal activity on and off the network. Risk assessment conveys the security and information risks that may arise in an institution; this helps plan for unexpected situations. Risk can be influenced by internal or external forces aimed at destabilizing the organization so that it is no longer able to achieve its information security objectives. To assess any risk, it is necessary to discover the terrors that may arise and the susceptibilities to threats (Tene, 2012). Unintentional human: or human event The probability that someone will deliberately or accidentally do something that will cause damage tothe computer. the network is very high or someone is going to do something underdeveloped (like shutting down the server). In this context, there is a requirement for security verification and compression (use of clear and personal guidelines) or password in order to be able to access the computer. Malicious Human: (or people with a criminal mind) These are people with malicious intentions. intention; it is classified into three: identity theft, interception and interference. Identity theft is compared to deception. This happens when someone cheats or disguises themselves to gain access by illegally falsifying data about someone else's assets. Interception refers to a situation where one hacks the server or mail primarily to obtain facts or dynamic data or trade secrets in order to disrupt the business organization, trade secret information or to make sing the team. Therefore, the use of decent verification and data encryption of statistics for defined assets is essential, as well as the use of locks to prevent the removal of supercomputers. The influence of convicts can be internal or external. Points at which risk should be assessed in a computer network Threat assessment refers to the system that should sometimes be constant; this requires continuous effort. There is indeed no bad time to assess risks and examine network vulnerabilities. Threat assessment is not only about understanding technological security resolution, but also about understanding professional validation to affect security. The main areas where risks should be assessed are: when the different codes, software or presentations are established, to ensure the security state of the system as well as to know if the review carried out previously will be useful in the event of a security issue . Whenever changes are prepared on programs or programs, they will help expose susceptibilities that may have a secondary influence. Risk and vulnerability assessment should be carried out frequently.conducted to review the control applied and whenever there is a security influence, invasion or attack. Therefore, help perceive how online breakdowns are carried out and provide effective strategies to reduce the risk. As with any crime, the threat to data privacy and reliability comes from a very small minority of criminals. A single user operating from a main computer can cause the destruction of a large number of systems in an organization. Additionally, acts of terror can also be triggered by employees providing services within professional associations. Supreme system securities specialists say most network attacks are initiated by personnel who work within the organizations where breaches have occurred. Through mistakes, workers often tend to destroy their own company's networks and degrade data. Additionally, with remote technology, businesses are growing to include large numbers of remote workers, branch offices, and corporate associates. These remote organizations and associates pose the same dangers as internal staff as well as the risk of security breaches if their remote network assets are not properly protected and supervised. Therefore, for a company to protect its data, it needs to have detailed information about potential competitors and their activities. The dangers for the.