Data Security & Public Administration
Nicole Hill
Brandman University
Action-Learning-Project-Summer-I-2017-PADU-688-OL1
Abstract (Change this)
In this paper we will look at defining the problem of data security and public administration. The reader will see the evidence gathered to get a better understanding of the problem of not securing data when sending it. The reader will learn different alternatives to how they can ensure the data is secure.
What makes this a public/non-profit issue (as opposed to a private issue)? What is the significant/relevant history of the issue/problem? What is/are the potential causes of the issue/problem? Why should we care about this issue/problem (why is this issue/problem significant)? This paper
…show more content…
Making sure the information is transmitted securely due to the importance of it will be something that the government would have to figure out. Technology with all its greatness was created for us to make a better world for ourselves and our legacies. We have keyless entry for our vehicles; you can for coffee using your phone. The simplest thing like having you garage door open using a link from your vehicle is data security. It is the little things that hackers can use to take over a person, a company or a whole organization.
The history of the problem is being able to keep information secure from those who wish to do harm towards the government or the citizens. There are so many moving parts to the government in which data is used to contribute to the necessary. If the information of our citizens were free to be accessed by anyone then we would have a serious problem. Although it is the right of the people to know how they are being affected it is necessary to secure certain information. We go online and we apply to jobs, we turn over everything a person needs to take our identity. As a public official you are like an officer of the courts, and you are expected to be trusted with information, but if your computer is hacked all just became information into the wrong hands.
“Research, when misused, may unfairly disadvantage some people”. (Johnson, 2010 pg.220). The significance of paying attention to the problem of not having
Confidentiality is the protection of information from unauthorized access. This is the assurance that information provided has not been made known to unauthorized persons, processes or devices. The application of this security service suggests information labeling and need-to-know imperatives are core aspects of the system security policy. Information, in today’s world, has value and everyone has information they wish to keep secret. Information such as credit card details, trade secrets, personal information, government documents, and many more. It was stated (Securitas Operandi™, 2008) that, we are bound to keep many secrets – corporate, staff, and personal secrets. We must keep this confidential information under wraps and earn the trust of employers, colleagues, and regulators every day. Mechanisms to enforce this include cryptography, which is, encrypting and decrypting data, access controls such as
The Internet was first used in the nineteen sixties by a small group of technology professionals. Since then the internet has become an essential part of today’s world, from communicating through texts and emails to banking, studying, and shopping, the internet has touched every aspect of our lives. With the growing use of the internet, protecting important information has become a must. While some believe they have the right to privacy, and feel that the government should not be at the center of their lives. Others feel that the Internet has evolved into a weapon for our enemies, and believe the government must take action by proactively
In this document I will be discussing the laws that are related to security and privacy of datas, I will explain how they relate to the security and privacy of data.
The increasing power and functionality of technology has increasingly invaded privacy and complicated security. Technology has made it possible for the government to
The consumer expects that when using a public computer for a specified task such as printing through a service, that the data or material is protected from other users including employees. When using a public computer for internet surfing, tax filing banking, etc. the general public user does not always think about the threats to security of their own personal information. It is important for the company to protect the users in addition to the users understanding the potential threats that exist when entering personal information.
Personal data are regulated by United Nations and urges States to implement effective measures to ensure that information concerning a person´s private life does not reach the hands of person who are not authorized by law to receive,process and use it.Thus private data are protected not only by law of States also by international laws, and concerning computer misuse
The administration of data security depends on three unique ranges of responsibility. These are most certainly not regularly connected or facilitated as their management is set in various authoritative structures which may not converse with each other.
Many people have no desire for the government to take part in any variety of communication structures, simply because of the incident regarding Edward Snowden. The vital leaks by Snowden have the public worried about not trusting the government because of the exposure and the possible violations of our rights. I do not think there is a problem with the actual involvement of the government, the issues lie with how much actual involvement will the government have? The reality is that the Cybersecurity danger is not going to be fixed and is here to stay so figuring out solutions together for the long term is essential to
The primary goal of the government since its founding has been to ensure the safety of citizens. It has developed an array of methods, procedures, and systems to achieve that goal. Throughout the years there has been some form of criticism regarding its methods. The most recent cause for public disapproval and concern stems from government surveillance brought to the light by former contractor of the National Security Agency (NSA), Edward Snowden. Snowden has brought attention to the surveillance being performed by the government that involves the United States. Surveillance could significantly deteriorate relations with other countries and destroy the trust that is held between the citizens and government leading to the collapse in stability and possibly the country itself. The potential for surveillance being used as a tool for the protection of citizens can prove to be monumental, but is vastly outweighed by the negative repercussions it could inflict if misused.
Today the world relies on technology and so does the government. The politics has the ability to hack and see through our private information at any give time. It gives the government limitless access to the network. The authority has so many ways on hacking devices and have smart hackers find a “backdoor” to it. I think the government shouldn’t have this kind of people to look through our information or anybody at all.
While all of these technologies have enabled exciting changes and opportunities for businesses, they have also created a unique set of challenges for business managers. Chief among all concerns about technology is the issue of information security. It seems to be almost a weekly occurrence to see a news article about yet another breach of security and loss of sensitive data. Many people will remember high profile data breaches from companies such as T.J Maxx, Boston Market, Sports Authority, and OfficeMax. In the case of T.J. Maxx, a data breach resulted in the loss of more than 45 million credit and debit card numbers. In many of these incidents, the root cause is a lack of adequate security practices within the company. The same technologies that enable managers can also be used against them. Because of this, businesses must take appropriate steps to ensure their data remains secure and their communications remain
Next I would like to speak about effective measures to protect data. Selection of security means should be based on an effective protection and meanwhile should be convenient. As advises article Anonymity for lazy people (2004, June
The government needs to take greater steps to protect and secure government information from foreign cyber-attacks.
As technology evolves and continues to deeper integrated within businesses so does the ingenuity of attackers and threats. In order to provide a barrier on which stakeholders can rely on there must be the implementation of a system that serves as a means to information assurance. Information assurance, through addressing confidentiality, integrity, and availability of data serves to provide the business environment with the confidence needed to further its pursuits in the sometime sketchy world of the internet of things. Confidentiality of data speaks to the business need of ensuring that data, within a given environment, is protected by a set of policies, procedures and business practices that have the goal of limiting data access to authorized parties. An example of proactively enforcing confidentiality is the use of biometric or two-factor verification. However, keeping data confidential is not enough, the systems being used must be designed so that data can maintain its integrity. The goal of data integrity is to ensure consistently accurate data as it flows between various networks and systems. An example of a control that seeks to maintain the integrity of data is to have a backup system in place that may be used in the case of an emergency disruption which is commonly part of BCDR planning. With confidentiality and integrity addressed the data now needs to be available when needed. Availability of data can be provided through the use of controls such as physical
Privacy is the condition of being separated from the perspective of others. This grants a particular presentation of one 's character and information. For some, it infers indefinite quality, and for others, it gathers security of before long identifiable information. The implications of security fluctuate transversely over individuals and social orders. The Internet serves as the routines for correspondence and a stage for fiscal trades, and a lot of essential data is exchanged over it. With its growing use for distinctive purposes, another thought has created Internet security. It fuses tending to the security needs of customers ' information and expecting presentation of the eventually identifiable purposes of enthusiasm of