Web data case-Data Leakage and Data Loss PreventionG

docx

School

Maasai Mara University *

*We aren’t endorsed by this school

Course

AMERICAN G

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

5

Uploaded by CoachEnergy9218

Report
1 Data Leakage and Data Loss Prevention Student's Name Institutional Affiliation Course Date
2 According to Al-Harrasi et al. (2021), cybersecurity has gained significant attention due to numerous high-profile data breaches and losses in the recent past. As organizations move their data storage to the cloud, they are becoming more worried about preventing data leaks and losses. While cloud storage is often viewed as having stronger security than traditional on- premises storage, it is still crucial for organizations to prioritize the prevention of data breaches and loss. To achieve this, there are fundamental principles that organizations can adhere to when moving to the cloud. Data Encryption Rashid and Chaturvedi (2019), argue that encryption is a crucial principle in preventing data breaches in cloud storage due to the challenges associated with accessing and storing data in the cloud. It is essential to avoid sending sensitive data in plain text, as well as accessing data through public Wi-Fi networks. Employees who need to access organization data remotely should use a virtual private network (VPN) to encrypt the data, regardless of the connection they use to access the cloud. Employee Education on Phishing Employee education on phishing is crucial in preventing data leakage and loss in the cloud. This involves teaching employees about the dangers of clicking on links in emails that are not authenticated, as well as how to identify phishing attempts (Belyh, 2020). Organizations can conduct regular training sessions and provide resources such as articles, videos, and infographics to help employees stay informed about phishing tactics. It is also recommended that organizations conduct periodic penetration testing by sending out fake phishing emails to evaluate whether employees are vulnerable to such attacks.
3 Using Two-Factor Authentication The principle of two-factor authentication is vital for preventing data leakage and loss, although it may be challenging for users to implement. This principle involves adding an extra layer of security to cloud user accounts. If a user loses their login credentials or if they are stolen, cybercriminals will find it difficult to gain access to their cloud accounts because of the additional security measures involved. Two-factor authentication can be implemented in various ways, including requiring users to answer security questions or using a security verification code sent to their mobile phones (Barona & Anita, 2017). Adopting a Decent Password Policies Organizations should adopt password policies that promote the use of complex passwords, such as passphrases, and discourage the use of easily guessed passwords. Password managers should also be encouraged to generate and store complex passwords, and passwords should be set to expire after a certain period to ensure regular updates. This helps prevent cyber- attacks that aim to guess passwords, such as brute-force attacks (Barona & Anita, 2017). Setting Correct User Permissions To prevent data loss and leakage, it is important to immediately terminate the access of a cloud user who is no longer employed by the organization. Additionally, users should only be granted access to data that is necessary for their job, and should not be given access to data that is not required for their role. These practices help to reduce the risk of data breaches caused by a single account (Al-Harrasi et al., 2021). Practice Data Backups
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 To mitigate the risks of data loss and leakage in cloud computing, it is advisable for organizations to have an additional backup of mission-critical data stored outside of their cloud provider. Furthermore, it may be beneficial for an organization to store some data on physical drives that are secured on site. These measures can also help protect against cybersecurity threats like ransomware, as well as intentional or accidental data destruction (Cheng et al., 2017). Using the Right Cloud Provider To ensure the prevention of data leakage and data loss, it is essential for an organization to select an appropriate cloud provider with a comprehensive knowledge of these risks and their countermeasures. It is also crucial for the organization's leadership to have discussions with the cloud provider regarding their security protocols, including their data backup strategies and measures for preventing data leakage and data loss. It is crucial for the cloud provider to prioritize data security since their reputation is built on the strength of their security practices, which should align with the organization's security goals (Barona & Anita, 2017). Upholding a Single Source of Truth Maintaining a single source of truth is crucial for an organization, whether data is shared internally or externally. To achieve this, organizations can limit the number of copies they share using collaboration tools. This approach ensures secure collaboration among users while reducing the number of copies in circulation, thereby minimizing the risk of data loss and data leakage. Watermarking documents can also be helpful in tracking the origin of a possible data breach, thereby mitigating the impact of data loss. (Al-Harrasi et al., 2021)
5 References Al-Harrasi, A., Shaikh, A. K., & Al-Badi, A. (2021). Towards protecting organisations’ data by preventing data theft by malicious insiders. International Journal of Organizational Analysis. Barona, R., & Anita, E. M. (2017, April). A survey on data breach challenges in cloud Computing security: Issues and threats. In 2017 International conference on circuit, power and computing technologies (ICCPCT) (pp. 1-8). IEEE. Belyh, A. (2020). Cloud Encryption: Challenges and Recommendations. Retrieved from https://www.cleverism.com/cloud-encryption-challenges-and-recommendations/ Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1211. Rashid, A., & Chaturvedi, A. (2019). Cloud computing characteristics and services: a brief review. International Journal of Computer Sciences and Engineering, 7(2), 421-426.