Response to discussion 1 ETC
Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Top of Form
With advanced technology, there have been millions of cases of security threats that affect how files, documents, and data are shared among individuals may be within their working environment or from whichever place they may happen to be during the data sharing exercise. Security issues have posed a lot of concerns to many organizations and other business entities. This issue has triggered innovations on the provisions of a secure environment that are safe for data sharing or storage for effective utilization of the said information wherever and whenever needed (Zafar, 2017). It should be understood that data sharing is an important tool in any given situation, especially in our everyday life that demands frequent updates and reference of previous historical information for guidance on decision making with respect to anticipated or uncertainty that will be presented by our future.
Some of the available tools for data sharing in secure ways include the use of Dropbox, which is known by many as a storage medium. Worth mentioning is that although Dropbox is utilized as a storage medium, it also has awesome features that make it a more secure and safe tool for sharing files and data. Perhaps Dropbox deploys SSL or TLS during the data and file sharing process to securely send the data by protecting the 128-bit tunnel (WIRED., 2020). Besides that, Dropbox also secures data from infringement by sending it blocks that are usually fragmented to make n them almost unrecognizable as they are highly encrypted using 256-bit AES encryption.
Another way of securely sharing data is through barcode media, which embeds images with specific codes that are totally invisible. To be more precise, it will be advisable to use Waspbarcode, which offers security to the files and data sent by sing top notch encryption. Other means of sharing data safely are SHAREit, NFC, and many others (WIRED., 2020).
Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data?
Most cautious precautions that should be undertaken when sharing data include frequent updating of encryption mechanisms to ensure that strong passwords are put in place to protect data. It will also be wise for computer and laptop users to ensure that their gadgets are always under protection to keep off intruders. In so doing, their data will be protected and securely maintained. In addition to that, using or setting up firewalls will also play a vital role in safeguarding network paths for incoming and leaving traffic (Waghmare, 2018). It is also good to be smart in dealing with emails and web surfing by avoiding redirecting links and unknown apps that are frequently sent to your email address from unknown parties (LE, 2017).
References
LE, A. (2017, May 23). The 10 Data Security Measures you must take for your business – Wimi. Retrieved from https://www.wimi-teamwork.com/blog/10-data-security-measures/
Waghmare, C. (2018). Ways to Keep Your Network Engaged. Yammer, 47-69. doi:10.1007/978-1-4842-3796-0_3
With changing work styles, there are numerous new dangers to information security. Be it representative data, client installment information, or business techniques, each association is stressed over their delicate information security. Organizational security may seem like a straightforward idea to get a handle on. However, there have been a few rates of information break nowadays. It has become a difficult assignment, particularly for little and medium estimated organizations, who need to bargain with network safety efforts due to tight income.
To ensure delicate data against malevolent specialists, it’s essential to make these significant strides.
Using passwords to secure zip files
This improves the protection of the data. Data in the zip is secured from direct access by unauthorized users. Tools that are free or of low cost are available. But there are tools for cracking passwords that exist. Zip files with passwords can easily be decrypted using such tools as they are free or cost less. This method of password protection is therefore rendered useless because they can be easily cracked but is better than nothing.
Use of separate emails.
Data with sensitive data such as usernames and passwords should not have sent in a single message. This will avoid risks of access by unauthorized users in case of an attack.The message can then be separated into two. But hackers can sometimes find the usernames if they have passwords and vice versa (Miners, 2014). Hence it is not safer.Files that are uploaded should have FTP server that is of standar. Using the best practices that are set for FTP file sharing, data can still be accessed by attackers.Protection and safety of data is not provided even in the best practices set thus difficult to share data safely.Wireless as well as public networks are very vulnerable thus easily attacked.
Secure delivery
This is a safer technique of file sharing. By affecting the SSL encryption method and high-end encryption similar to that of the military, messages are secured. Upon file opening by the receiver, a mail is received by the sender.No program is installed, and a browser is only needed. The technique can bypass the firewall with various restrictions. Third-party providers of storage services are not used. They are less expensive. Support services are available such as calls and emails. CIA triad is affected by this technique. Data is not altered by parties that are not authorized. The information is sent, and even if the resources are available, the data has to be sent to reach the receiver (Mello, 2018). The resources needed to send data successfully are made available. The resources are barely not reached.
Encrypt your data for protection
Making sure about information inside the corporate organization is significant for all associations, be it SMBs or large undertakings. While they are receiving different safety efforts to forestall unapproved admittance to their information in rest, an equivalent safety effort is needed for ensuring the information moving (Miners, 2014). As the delicate information moving is gotten to by a wide range of individuals and applications, it should be scrambled for protected information organizing.
An association broad security practice should be received to forestall unapproved admittance to high-esteem information. In a few cases, programmers have focused on prominent individuals like heads of an organization since they will probably approach all touchy data. Organizations wind up bargaining with the security of their information by offering more prominent self-governance to prominent representatives. The best practice is to devise equivalent safety efforts for each individual from an association without coming up short. To forestall malware and ransomware assault occurrences, it’s significant that each representative knows about security rehearses and submit to them consistently (Mello, 2018). A culture of security mindfulness can encourage a considerable change in identifying and forestalling potential security dangers.
References
Miners, Z. (2014). Retailers unite to share threat data, improve security. Computerworld, 48(10),
2–.
Mello, L. (2018). Clinical Trial Participants’ Views of the Risks and Benefits of Data Sharing.
The New England Journal of Medicine, 378(23), 2202–2211. https://doi.org/10.1056/NEJMsa1713258