Data Protection

Introduction
Organizations data is any business most critical asset. With explosion of corporate data in the 1990s, accumulation and management of data is now a priority. Organizations are now trying to accumulate different types of data on excessively large storage system and gathering of clients data, product vendor information, product data and manufacturing metrics has now become part of an enterprise goals. It is this management of data that is now a cause of concern within IT departments, corporate legal offices and the executive management with much focus being on protecting and managing data (Tom Petrocelli,2005 )

Data Protection Techniques
There is an urgent need to protect information and data has to be kept intact and it should be available on the event of a hard drive failure, some of the techniques that may be used for data protection and encryption may involve

Key based encryption algorithm This is the ability to specify a certain key or password and at the same time have the encryption method alter itself automatically such that each key or password is able to produce a different encrypted output which will require a unique key or password in order to be decrypted. The key may be either symmetrical or asymmetrical in which the encryption key (public key)will be very different from the decryption key (private key) so that any attempt to derive private key from the public key becomes completely impractical due to the number of hours which will be required in cracking it (R. E .Frazier, 2004).

Privacy Principles Privacy considerations may go a long way in ensuring users data is adequately protected. Before designing a protection scheme it should be determined who should have access to what data and under which conditions. This is elaborated on six principles laid out by Marc Langheinrich for guiding privacy-aware system design (Yitao  John).

Notice Users should be aware of their collected data.
Choice and consent Users of the data should be able to choose whether their data should be used or not.

Anonymity The system should be able to mimic real world norms.
Security There should be various levels employed depending on the situation at hand.
Access Users should have complete access to their data.

Here also a user IP address may also be obstructed hence protecting user anonymity in communication and data capturing. The users expose their identities but their locations are always concealed

Conclusion
It is of great essence to protect users privacy and data available on the system. Techniques for protecting data which may involve cryptography and other encryption methods should always be used whenever necessary since users data which is also the organizations data consists of unique characteristics which are very ideal for the organization marketing activities.

0 comments:

Post a Comment