The Problem Of Using Data Security Needs For Companies At The Present World

1300 Words6 Pages
In a society exploding with information, people are forced to conduct business contracts online. As the business grows, so does the data they have on hand. Most of the companies, for instance, the Wonderful Company, have built their own databases to store complex data, including their customers’ personal information, business plans, secret contracts, supplier files, human resources and other important business information that they do not want their competitors to see, or get into hackers’ hands. The problem is that the unprotected databases are easily accessed by a third party (Bobbie, 2007). The severe consequences of leaking data could be commercial malicious deception, customer churn if they found your branch leaked out their personal…show more content…
Data security is the most concerned for the Wonderful Company because it displays its data of brand in the Internet. Since for the Wonderful Company, it is difficult to guarantee data security when its website is suffering from Distributed Denial of Service (DDoS) attacks. DDoS is one kind of common network attacks like you drive very slowly on only one lane of the highway so that other cars behind you cannot drive quickly to their destinations. Obviously, DDoS blocks the traffic of websites on purpose if some people such as hackers start DDoS attacks for its website. In addition, DDoS attacks are the primary reason for data loss in the Internet. For instance, according to Collateral damage: 26% of DDoS attacks lead to data loss, comparing with 31% of small and midsize business had data loss, 22% of large business still had this problem. Losing data was more probable for small companies after a DDoS attack (2015). As we can see above, it shows that one of five large companies like the Wonderful Company had DDoS attacks. Therefore, it is necessary for the Wonderful Company to take some measures to protect business data from DDoS attacks. According to Phatak, Sherman, Joshi, Sonawane, Relan & Dawalbhakta (2013), Spread Identity (SI), including address filtering, reverse Turing tests can provide the defending of DDoS attacks (p. 233). Phatak et al. (2013) found that first, SI offers destination IP address filtering which can block the
Open Document