0% found this document useful (0 votes)
29 views20 pages

System Management

Ding ding dong

Uploaded by

kl.aarunprasath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views20 pages

System Management

Ding ding dong

Uploaded by

kl.aarunprasath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Title: A Study on Data Security in Information Systems Management

CHAPTER 1

1.1 Introduction
Introduction to Data Security Data security refers to the protective measures employed to
safeguard information from unauthorized access, corruption, or theft. In an era where information
is a valuable commodity, the integrity, confidentiality, and availability of data have become
paramount for organizations across various sectors. As businesses and governments become
increasingly reliant on digital technologies, data security has emerged as a critical aspect of system
management. This is due to the growing complexity of information systems and the necessity of
managing vast amounts of data generated every day. With the rise in cyberattacks, data breaches,
and evolving cyber threats, organizations must ensure that their information systems are equipped
with robust security measures to protect sensitive information, such as customer data, financial
records, and intellectual property.

The importance of data security cannot be overstated. As organizations collect and process
sensitive information, such as personal data, financial records, and trade secrets, they become
prime targets for cybercriminals. A successful cyberattack can lead to significant financial losses,
legal repercussions, and damage to reputation. Moreover, with the implementation of data
protection regulations like the General Data Protection Regulation (GDPR) and the Health
Insurance Portability and Accountability Act (HIPAA), organizations are mandated to adhere to
strict data protection standards. Failure to comply with these regulations can result in hefty fines
and foss of customer trust.

Data security is essential for several reasons. First, it protects sensitive information, ensuring that
organizations safeguard data that can include personal identification information (PII), financial
records, and confidential business information. This is particularly critical in a digital landscape
where data breaches can have catastrophic consequences. Second, data security helps prevent
financial loss. Cyberattacks can result in significant monetary damages due to theft, fraud, and the
costs associated with recovering from a breach. Implementing robust data security measures is a
proactive approach to mitigate these risks. Third, maintaining business continuity is vital; effective
data security ensures that business operations can continue without interruption, even in the event
of a cyber incident. By safeguarding data, organizations can maintain their services and avoid
downtime that can result from data breaches.

Moreover, regulatory compliance is a significant aspect of data security. Various industries are
subject to regulations that mandate the protection of sensitive data. Organizations must implement
data security measures to comply with these regulations, avoiding potential fines and legal
consequences. For example, the GDPR imposes strict requirements on how organizations collect,
process, and store personal data, compelling them to adopt comprehensive security measures.
Lastly, building customer trust is essential in today's digital marketplace. Consumers are
increasingly aware of data security issues and prefer to do business with organizations that
prioritize data protection. By demonstrating a commitment to data security, organizations can
foster trust and loyalty among their customers, leading to long-term business success.

As data protection regulations become more stringent, organizations must ensure that their data
security practices comply with applicable laws. Notable regulations include the General Data
Protection Regulation (GDPR), which governs the processing of personal data in the European
Union. It mandates that organizations implement appropriate security measures to protect personal
information and imposes significant fines for non-compliance. The Health Insurance Portability
and Accountability Act (HIPAA) establishes standards for protecting sensitive patient information
in the healthcare sector, requiring healthcare providers and organizations to implement data
security measures to safeguard electronic protected health information (ePHI). The Payment Card
Industry Data Security Standard (PCI DSS) sets requirements for organizations that handle credit
card information, making compliance with these standards essential for protecting customer
payment data and avoiding penalties.

As technology evolves, so do the threats to data security. Organizations must stay ahead of
emerging trends to protect their sensitive information effectively. Artificial intelligence and
machine learning technologies are increasingly being utilized to enhance data security, as these
technologies can analyze vast amounts of data to identify anomalies and potential threats, enabling
organizations to respond more quickly to security incidents. Zero Trust Architecture is a security
model that assumes that threats can exist both inside and outside
the network, requiring strict identity verification and continuous monitoring of user activity,
thereby minimizing the risk of unauthorized access.As organizations migrate to cloud-based
services, ensuring the security of data in the cloud is paramount. Organizations must adopt cloud
security best practices, such as encryption and access controls, to protect their data in cloud
environments. Furthermore, as data security threats continue to evolve, regulations will likely
become more stringent. Organizations must stay informed about regulatory changes and ensure
that their data security practices align with new requirements to maintain compliance.

In conclusion, data security is a vital aspect of modern system management, ensuring the
protection of sensitive information against unauthorized access, corruption, and theft. As
organizations face increasing threats from cybercriminals and the demands of regulatory
compliance, the implementation of robust data security measures is essential. By understanding
key concepts such as confidentiality, integrity, and availability, and staying informed about
emerging trends, organizations can enhance their data security posture and protect their valuable
information assets. The commitment to data security not only safeguards sensitive data but also
fosters trust and confidence among customers, ensuring the long-term success of organizations in
an increasingly digital world.

1.2 Industry profile


1.3 Need for Study
• Increasing Cyber Threats: The rise in cyberattacks has made it imperative for organizations
to adopt advanced data security measures to protect sensitive information from
unauthorized access and breaches.
• Regulatory Compliance: Compliance with data protection regulations such as GDPR and
HIPAA is essential for organizations to avoid legal penalties and maintain trust with
customers.
• Organizational Impact: Data breaches can lead to severe financial losses, legal
repercussions, and damage to an organization's reputation, underscoring the need for
effective data security practices.
• Evolving Technologies: As organizations adopt new technologies, understanding their
impact on data security is crucial for ensuring that systems remain resilient against
emerging threats.
• Employee Awareness: Employee negligence remains a significant vulnerability; thus,
training is essential to ensure that all staff understand and follow data security protocols.

1.4 Scope and Significance of the Study

• Focus on Data Security Measures: The study will evaluate existing data security practices
in various organizations, providing insights into their effectiveness and areas for
improvement.
• Assessment of Vulnerabilities: Identifying common vulnerabilities will help organizations
understand the specific threats they face and prioritize their security efforts accordingly.
• Impact Analysis: The research will analyze how data breaches affect organizational
operations, helping stakeholders comprehend the importance of investing in robust data
security.
• Regulatory Influence: By examining the role of regulations like GDPR, the study will
provide organizations with a clearer understanding of compliance requirements and best
practices.
• Emerging Technologies: The investigation into how technologies such as blockchain and
Al can enhance data security will contribute to innovative approaches in the field.
• Employee Training Programs: The study will explore effective training strategies.
emphasizing the role of human factors in maintaining data security within organizations.

1.5 Objectives of the Study

➢ To evaluate the effectiveness of existing data security measures in system management.


➢ To identify common vulnerabilities and challenges in securing organizational data.
➢ To assess the impact of data breaches on organizational operations and financials.
➢ To explore the role of employee training in maintaining data security.
➢ To recommend strategies for enhancing data security practices within organizations.
➢ To analyze the influence of regulatory frameworks such as GDPR on corporate data
security policies.
➢ To examine the role of emerging technologies le.g., blockchain, Al) in improving data
security.

1.6 Limitations of the Study

▪ Sample Size: The study may be limited by the number of organizations involved, which
could affect the generalizability of the findings.
▪ Rapidly Changing Technology: The fast-paced evolution of technology may lead to
findings that become outdated quickly, necessitating ongoing research in the field.
▪ Subjectivity in Data Collection: Data collected through surveys or interviews may be
subject to bias, impacting the reliability of the results.
▪ Focus on Specific Regulations: The study primarily addresses GDPR and similar
frameworks, which may overlook other important regulations and practices in different
regions.
▪ Resource Constraints: Limitations in time and resources may restrict the depth of analysis
that can be conducted within the study.
▪ Lack of Longitudinal Data: The study will be conducted within a limited timeframe, which
may not capture long-term trends and impacts of data security measures.
CHAPTER II

Literature Review
Hassan, W. & Yang, Y. (2021). "Data Security Challenges in Cloud Computing: A
Systematic Review."
This paper systematically reviews the challenges organizations face in securing data in
cloud environments. The authors discuss various vulnerabilities associated with cloud
storage and highlight the need for robust security measures. This study is relevant as it
provides insight into specific challenges organizations encounter when managing data
security in the cloud.

Sadeghi, A., Wachsmann, C., & Waidner, M. (2015). "Security and Privacy Challenges
in Industrial Internet of Things."
The authors explore security and privacy issues in the Industrial Internet of Things (IIoT),
emphasizing the importance of data protection in interconnected environments. Their
findings underline the complexities of ensuring data security across multiple platforms,
relevant for understanding data security in modern systems.

Kaur, G., & Saini, H. (2019). "A Survey on Data Security in Cloud Computing."
This survey addresses various data security techniques employed in cloud computing. It
categorizes existing methods and evaluates their effectiveness in protecting sensitive data.
This literature contributes to understanding how different security practices can be adopted
to mitigate risks in cloud environments.

Sharma, A., & Gupta, A. (2020). "Impact of Data Breaches on Firm Performance:
Evidence from a Global Perspective."
This study analyzes the financial impact of data breaches on organizations worldwide. The
authors find that breaches significantly affect firm performance, particularly in terms of
stock prices and customer trust. This research is essential for illustrating the potential
repercussions of inadequate data security measures.
D’Arcy, J. & Hovav, A. (2009). "On the Effectiveness of Security Policies: A Process-
Based Approach."
The authors propose a process-based framework for assessing the effectiveness of
organizational security policies. Their findings suggest that simply having security policies
is not enough; the implementation and adherence to these policies are crucial. This study
emphasizes the need for organizations to not only establish but also enforce data security
protocols.

Wang, Y., & Hu, H. (2021). "Data Security and Privacy in Big Data: A Review."
This review examines the challenges of data security and privacy in big data environments.
The authors discuss various techniques for safeguarding data, including encryption and
access controls. Their insights are vital for understanding how to handle large volumes of
data securely.

Zhou, Y. & Yang, J. (2019). "The Role of Employee Training in Enhancing Data Security:
A Case Study."
This case study explores how employee training programs can enhance data security
awareness and reduce vulnerabilities. The findings highlight that well-trained employees
are crucial to maintaining effective data protection. This literature is relevant to your
objective of exploring employee training's role in data security.

Sun, J., & Zhang, L. (2022). "The Impact of GDPR on Data Security Practices in
Organizations."
This paper examines the influence of the GDPR on corporate data security policies. The
authors analyze how organizations have adapted their practices to comply with GDPR
requirements, emphasizing the regulation's role in promoting better data security standards.
This study aligns with your focus on regulatory compliance.
Garg, S., & Kaur, R. (2020). "Emerging Technologies for Data Security: A Review of
Blockchain and AI."
The authors discuss the potential of blockchain and artificial intelligence in enhancing data
security. They outline how these technologies can be utilized to protect sensitive
information and respond to security incidents. This literature supports your examination of
emerging technologies in data security.

Alhassan, I., & Eshun, K. (2020). "Evaluating the Effectiveness of Data Security
Measures in Organizations."
This study assesses various data security measures and their effectiveness in protecting
organizational data. The authors provide insights into common vulnerabilities and best
practices, which are essential for understanding the current landscape of data security

Luo, X., & Wang, C. (2021). "A Review of Cybersecurity Risk Management Frameworks."
This literature examines various cybersecurity risk management frameworks, discussing
their relevance to data security in organizations. The authors argue that adopting a
comprehensive risk management approach is crucial for enhancing data security practices,
supporting your objective of evaluating existing measures.

Wright, K., & Kreiss, D. (2019). "Data Protection and Privacy Compliance in the Digital
Age."
This article discusses the challenges organizations face in maintaining data protection and
privacy compliance amidst evolving digital landscapes. The authors emphasize the
importance of staying informed about regulatory changes to ensure effective data security
practices.

Rathore, A., & Chaudhary, A. (2020). "Cybersecurity Awareness among Employees: A


Literature Review."
This literature review analyzes studies focused on cybersecurity awareness and employee
training programs. The findings highlight the critical role of employee awareness in
preventing data breaches, aligning with your exploration of training as a key data security
component.

Jiang, S., & Zhao, Y. (2021). "The Role of Encryption in Data Security: An Overview."
This overview discusses the significance of encryption as a fundamental data security
measure. The authors explain various encryption techniques and their applications in
protecting sensitive data, reinforcing the need for organizations to adopt encryption as part
of their data security strategy.

Fitzgerald, R., & Wilden, R. (2020). "The Future of Data Security: Trends and
Predictions."
This article explores emerging trends in data security, including artificial intelligence,
machine learning, and the Zero Trust security model. The authors predict how these trends
will shape the future of data protection, providing valuable context for your analysis of
emerging technologies.

Zhang, Y., & Zhou, Z. (2021). "Data Security in Cloud Computing: A Review of Current
Research and Future Directions."
This paper provides a comprehensive review of the current state of data security research
in cloud computing, identifying key trends and challenges. The authors suggest areas for
future research, emphasizing the importance of adaptive security measures as cloud
environments evolve.

Bertino, E., & Islam, N. (2017). "Data Security and Privacy in the Internet of Things: A
Review."
The authors explore the unique data security and privacy challenges posed by IoT devices,
emphasizing the need for tailored security solutions that consider the constraints of these
devices. This study highlights the intersection of IoT technology and data security.
Egelman, S., & Peer, E. (2018). "The Importance of Transparency in Data Security and
Privacy."
This paper argues that transparency regarding data handling practices is crucial for building
user trust. The authors analyze how organizations can improve transparency to enhance
their data security posture and customer confidence.

Chakraborty, S., & Shukla, A. (2019). "Data Security Threats in Mobile Cloud
Computing: A Comprehensive Survey."
This survey examines data security threats specific to mobile cloud computing
environments. The authors categorize threats and propose strategies for mitigating risks,
highlighting the complexities of securing mobile data.

Mavridis, N., & Pangalos, G. (2020). "The Role of Artificial Intelligence in Enhancing
Cybersecurity Measures."
This literature discusses how AI can be leveraged to strengthen cybersecurity measures,
focusing on threat detection and response. The authors provide insights into AI-driven
solutions that can improve data protection across various sectors.

Reddy, M. & Reddy, A. (2020). "Data Security in E-Commerce: Challenges and


Solutions."
This paper explores the specific data security challenges faced by e-commerce platforms,
including payment security and consumer data protection. The authors propose a
framework for enhancing security measures in online transactions.

Kumar, A., & Singh, P. (2021). "Blockchain Technology for Data Security: A Systematic
Review."
This systematic review analyzes the application of blockchain technology for enhancing
data security. The authors discuss its benefits, challenges, and potential use cases in
securing sensitive information across industries.
Nash, J. & Tewari, R. (2021). "Social Engineering Attacks and Data Security: A Global
Perspective."
This article examines the growing threat of social engineering attacks on data security. The
authors provide case studies and suggest preventative measures to enhance organizational
resilience against such threats.

Liu, S., & Li, Y. (2020). "Privacy Preservation Techniques in Data Mining: A Survey."
This survey focuses on privacy preservation techniques utilized in data mining processes.
The authors review various methods for ensuring data privacy while maintaining analytical
utility, highlighting their relevance in data security contexts.

Suh, J., & Ryu, H. (2020). "An Overview of Cybersecurity Regulations: Implications for
Data Protection."
This paper provides an overview of key cybersecurity regulations affecting data protection
practices. The authors analyze the implications of these regulations for organizations,
emphasizing the need for compliance to ensure data security.

Bhalerao, A., & Jadhav, S. (2019). "Data Security in Healthcare: Current Trends and
Future Directions."
This study investigates data security challenges in the healthcare sector, focusing on patient
data protection and regulatory compliance. The authors propose strategies to enhance data
security in healthcare information systems.

Aly, M., & Sadiq, A. (2021). "Cybersecurity Risk Assessment Frameworks: A


Comparative Study."
This paper compares various cybersecurity risk assessment frameworks, highlighting their
strengths and weaknesses. The authors provide insights into selecting appropriate
frameworks for improving data security in organizations.
Tang, J., & Zhang, X. (2021). "The Influence of Organizational Culture on Data Security
Practices."
This research explores how organizational culture impacts data security practices. The
authors discuss the role of leadership, employee engagement, and communication in
fostering a culture of security awareness.

Xie, J., & Wang, Z. (2021). "Incident Response and Data Security: A Case Study
Approach."
This case study analyzes the incident response strategies of organizations facing data
breaches. The authors emphasize the importance of a well-defined incident response plan
in mitigating the impact of security incidents.

Tiwari, P., & Prasad, A. (2021). "Data Privacy in Social Media: Challenges and
Solutions."
This paper addresses the data privacy challenges posed by social media platforms,
examining how user data is collected, stored, and shared. The authors propose solutions for
enhancing user privacy in social media interactions.

CHAPTER III
Research methodology

CHAPTER IV
CHAPTER V

5.1 Findings Of The Study

▪ Prevalence of Cyber Threats: Organizations are increasingly targeted by cyberattacks. with


phishing, ransomware, and malware being the most common methods employed by
attackers.
▪ Impact of Data Breaches: Data breaches can result in substantial financial losses, with
studies indicating that the average cost of a data breach can exceed millions of dollars,
depending on the scale and nature of the incident.
▪ Regulatory Compliance Challenges: Many organizations struggle to meet the stringent
requirements set by regulations such as GDPR and HIPAA, often due to a lack of
understanding or resources.
▪ Insider Threats: A significant percentage of data breaches originate from internal sources,
highlighting the need for effective monitoring and training programs for employees.
▪ Inadequate Security Measures: Many organizations still rely on outdated security practices,
leaving them vulnerable to advanced cyber threats.
▪ Importance of Data Encryption: Organizations that implement data encryption significantly
reduce the risk of data breaches, especially in industries dealing with sensitive information.
▪ Employee Training Gaps: There is often a lack of comprehensive training programs
focused on data security, leading to negligence and unintentional breaches by staff.
▪ Cloud Security Vulnerabilities: The migration to cloud services has introduced new
vulnerabilities, with improper configuration and inadequate access controls being primary
concerns.
▪ Adoption of Zero Trust Architecture: Organizations adopting Zero Trust models report
improved security postures by enforcing strict verification processes for aff users.
▪ Emerging Technologies in Data Security: Technologies such as artificial intelligence and
machine learning are increasingly being utilized to enhance threat detection and response
capabilities.
▪ Public Awareness and Trust: Organizations that prioritize data security are more likely to
gain consumer trust, which can translate into increased customer loyalty and business
success.
▪ Data Backup and Recovery Plans: Effective data backup strategies and incident response
plans are critical for minimizing the impact of data breaches.
▪ Cost of Non-Compliance: Failing to comply with data protection regulations can result in
hefty fines and loss of customer trust, emphasizing the importance of adherence to these
laws.
▪ Vendor Security Management: Third-party vendors often pose significant risks; therefore,
organizations must conduct thorough security assessments of their partners.
▪ Evolving Nature of Cyber Threats: The rapidly changing landscape of cyber threats
necessitates continuous updates to security measures and protocols to remain effective.
5.2 Suggestions

• Implement Comprehensive Training Programs: Organizations should develop and enforce


mandatory data security training programs for all employees, emphasizing best practices
and awareness of potential threats.
• Conduct Regular Security Audits: Routine security assessments can help identify
vulnerabilities and ensure that data protection measures are up to date.
• Adopt Advanced Security Technologies: Organizations should invest in artificial
intelligence and machine learning tools to improve threat detection and incident response.
• Establish a Data Governance Framework: A structured approach to managing data,
including ownership, data classification, and access control, can enhance security and
compliance.
• Utilize Data Encryption: Encrypt sensitive data both at rest and in transit to mitigate the
risk of unauthorized access in case of a breach.
• Develop Incident Response Plans: Organizations should prepare detailed incident response
plans that outline procedures for addressing data breaches effectively and minimizing
damage.
• Strengthen Cloud Security Measures: Ensure robust security configurations, including
access controls and encryption, to protect data stored in cloud environments.
• Engage in Vendor Risk Management: Establish a rigorous vendor management process that
includes security assessments of third-party providers.
• Implement Zero Trust Security: Shift towards a Zero Trust architecture to enhance security
by verifying all users and devices accessing the network.
• Encourage Reporting of Security Incidents: Foster a culture where employees feel safe
reporting potential security incidents without fear of repercussion.
• Stay Informed about Regulatory Changes: Organizations must monitor updates to data
protection regulations to ensure ongoing compliance.
• Perform Regular Backup Operations: Regularly back up data and verify that recovery
processes are effective and up to date.
• Utilize Threat Intelligence Services: Subscribing to threat intelligence platforms can
provide organizations with insights into emerging threats and vulnerabilities.
• Enhance Authentication Mechanisms: Implement multi-factor authentication (MFA) to add
an additional layer of security for accessing sensitive information.
• Foster a Security-First Culture: Encourage all employees to prioritize data security in their
daily activities, making it a core aspect of the organizational culture.
5.3 Conclusion

Data security has emerged as a critical concern in today's digital landscape, where organizations
face escalating threats from cybercriminals and the increasing demands of regulatory compliance.
As highlighted in this report, the ramifications of data breaches extend far beyond immediate
financial losses, impacting an organization's reputation, customer trust, and long-term viability.
The findings demonstrate that, despite advancements in technology, many organizations remain
ill-prepared to handle the complexities of data security. This underscores the urgent need for a
comprehensive and proactive approach to data protection.

Firstly, organizations must acknowledge the prevalence and sophistication of cyber threats. The
rapid evolution of attack methods necessitates that businesses adopt advanced security
technologies, such as artificial intelligence and machine learning, to enhance their threat detection
and response capabilities. Furthermore, the shift towards cloud computing introduces new
vulnerabilities, emphasizing the need for organizations to implement robust cloud security
measures, including data encryption and stringent access controls.

In addition to technology, human factors play a significant role in data security. Employee
negligence and lack of awareness are among the leading causes of data breaches. Therefore,
investing in comprehensive training programs is paramount. These programs should not only
educate employees about best practices but also foster a culture of security where reporting
potential threats is encouraged.

Moreover, the regulatory landscape continues to evolve, with frameworks like the General Data
Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act
(HIPAA) imposing stringent requirements on how organizations handle sensitive data. Compliance
with these regulations is not merely a legal obligation but also a critical aspect of maintaining
customer trust. Organizations must stay informed about regulatory changes and ensure their data
security practices align with evolving legal requirements to mitigate the risk of significant fines
and reputational damage.

Furthermore, the adoption of frameworks such as Zero Trust Architecture can significantly
enhance organizational security. By assuming that threats may exist both inside and outside the
network, this model requires continuous verification of user identities and activities, thereby
minimizing the risk of unauthorized access. As organizations navigate the complexities of modern
data security, a holistic approach that integrates technology, processes, and people will be essential
for fostering a resilient security posture.

In conclusion, data security is an indispensable element of effective system management. The


findings from this study emphasize the multifaceted challenges organizations face in safeguarding
their sensitive information. By implementing robust security measures,

prioritizing employee education, and adhering to regulatory standards, organizations can


significantly enhance their data security practices. The commitment to data security not only
protects valuable information assets but also cultivates trust and confidence among customers,
ultimately driving long-term business success. As cyber threats continue to evolve, organizations
must remain vigilant, adapting their security strategies to protect against new challenges and
ensure the integrity, confidentiality, and availability of their data in an increasingly digital world.
5.4 Bibliography

➢ Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed


Systems. Wiley.
➢ Briney, A. (2021). Cybersecurity Essentials. Cengage Learning.
➢ CISO Magazine. (2022). "The Cost of Data Breaches in 2022." Retrieved from CISO
Magazine.
➢ Gupta, A. (2021). Data Security and Privacy: A Comprehensive Guide to Managing
Information Security. Springer.
➢ ISO/IEC 27001:2013. (2013). Information Technology Security Techniques Information
Security Management Systems Requirements. International Organization for
Standardization.
➢ Kshetri, N. (2017). "1 Cybersecurity and Cybercrime in the Asia-Pacific Region." In
Cybercrime and Cybersecurity in the Global South (pp. 3-17). Springer.
➢ NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity. National
Institute of Standards and Technology. Retrieved from NIST.
➢ Ponemon Institute. (2023). Cost of a Data Breach Report. Retrieved from Ponemon
Institute.
➢ Privacy Rights Clearinghouse. (2022). "Data Breach Reports." Retrieved from Privacy
Rights Clearinghouse.
➢ Raghavan, S., & Swaminathan, S. (2021). "Data Security: An Overview." International
Journal of Computer Applications, 175(3), 1-7. doi: 10.5120/ijca2021921166.
➢ Rouse, M. (2023). "What Is Data Security?" Retrieved from TechTarget.
➢ SANS Institute. (2021). The 2021 Cyber Threat Landscape: Insights and Strategies for
Mitigating Risk. Retrieved from SANS Institute.
➢ Shostack, A. (2014). Threat Modeling: Designing for Security. Wiley.
➢ Stallings. W. (2019). Network Security: Essentials: Applications and Standards. Pearson.
➢ Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk Management Guide for
Information Technology Systems. NIST Special Publication 800-30. Retrieved from NIST.
➢ Toub, T., & Jones, A. (2020). "The Importance of Data Security in the Age of
Cybercrime."Journal of Cybersecurity Education, Research and Practice, 2020(2), 1-12.
➢ UK Information Commissioner's Office. (2022). Guide to Data Protection. Retrieved from
ICO.
➢ Von Solms, R., & Van Niekerk, J. (2013). "From Information Security to Cyber Security."
Computers & Security, 38, 97-102. doi:10.1016/j.cose.2013.04.004.
➢ Wroblewski, J. (2021). "The Role of Employee Training in Cybersecurity." Harvard
Business Review. Retrieved from HBR.
➢ Yoon, J. (2021). "Understanding Zero Trust Architecture." Information Systems Security
Association Journal, 19(1), 30-39. doi:10.1080/15511916.2021.1882916.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy