Web data case-Data Leakage and Data Loss PreventionG
docx
keyboard_arrow_up
School
Maasai Mara University *
*We aren’t endorsed by this school
Course
AMERICAN G
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
5
Uploaded by CoachEnergy9218
1
Data Leakage and Data Loss Prevention
Student's Name
Institutional Affiliation
Course
Date
2
According to Al-Harrasi et al. (2021), cybersecurity has gained significant attention due
to numerous high-profile data breaches and losses in the recent past. As organizations move their
data storage to the cloud, they are becoming more worried about preventing data leaks and
losses. While cloud storage is often viewed as having stronger security than traditional on-
premises storage, it is still crucial for organizations to prioritize the prevention of data breaches
and loss. To achieve this, there are fundamental principles that organizations can adhere to when
moving to the cloud.
Data Encryption
Rashid and Chaturvedi (2019), argue that encryption is a crucial principle in preventing
data breaches in cloud storage due to the challenges associated with accessing and storing data in
the cloud. It is essential to avoid sending sensitive data in plain text, as well as accessing data
through public Wi-Fi networks. Employees who need to access organization data remotely
should use a virtual private network (VPN) to encrypt the data, regardless of the connection they
use to access the cloud.
Employee Education on Phishing
Employee education on phishing is crucial in preventing data leakage and loss in the
cloud. This involves teaching employees about the dangers of clicking on links in emails that are
not authenticated, as well as how to identify phishing attempts (Belyh, 2020). Organizations can
conduct regular training sessions and provide resources such as articles, videos, and infographics
to help employees stay informed about phishing tactics. It is also recommended that
organizations conduct periodic penetration testing by sending out fake phishing emails to
evaluate whether employees are vulnerable to such attacks.
3
Using Two-Factor Authentication
The principle of two-factor authentication is vital for preventing data leakage and loss,
although it may be challenging for users to implement. This principle involves adding an extra
layer of security to cloud user accounts. If a user loses their login credentials or if they are stolen,
cybercriminals will find it difficult to gain access to their cloud accounts because of the
additional security measures involved. Two-factor authentication can be implemented in various
ways, including requiring users to answer security questions or using a security verification code
sent to their mobile phones (Barona & Anita, 2017).
Adopting a Decent Password Policies
Organizations should adopt password policies that promote the use of complex
passwords, such as passphrases, and discourage the use of easily guessed passwords. Password
managers should also be encouraged to generate and store complex passwords, and passwords
should be set to expire after a certain period to ensure regular updates. This helps prevent cyber-
attacks that aim to guess passwords, such as brute-force attacks (Barona & Anita, 2017).
Setting Correct User Permissions
To prevent data loss and leakage, it is important to immediately terminate the access of a
cloud user who is no longer employed by the organization. Additionally, users should only be
granted access to data that is necessary for their job, and should not be given access to data that
is not required for their role. These practices help to reduce the risk of data breaches caused by a
single account (Al-Harrasi et al., 2021).
Practice Data Backups
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
To mitigate the risks of data loss and leakage in cloud computing, it is advisable for
organizations to have an additional backup of mission-critical data stored outside of their cloud
provider. Furthermore, it may be beneficial for an organization to store some data on physical
drives that are secured on site. These measures can also help protect against cybersecurity threats
like ransomware, as well as intentional or accidental data destruction (Cheng et al., 2017).
Using the Right Cloud Provider
To ensure the prevention of data leakage and data loss, it is essential for an organization
to select an appropriate cloud provider with a comprehensive knowledge of these risks and their
countermeasures. It is also crucial for the organization's leadership to have discussions with the
cloud provider regarding their security protocols, including their data backup strategies and
measures for preventing data leakage and data loss. It is crucial for the cloud provider to
prioritize data security since their reputation is built on the strength of their security practices,
which should align with the organization's security goals (Barona & Anita, 2017).
Upholding a Single Source of Truth
Maintaining a single source of truth is crucial for an organization, whether data is shared
internally or externally. To achieve this, organizations can limit the number of copies they share
using collaboration tools. This approach ensures secure collaboration among users while
reducing the number of copies in circulation, thereby minimizing the risk of data loss and data
leakage. Watermarking documents can also be helpful in tracking the origin of a possible data
breach, thereby mitigating the impact of data loss. (Al-Harrasi et al., 2021)
5
References
Al-Harrasi, A., Shaikh, A. K., & Al-Badi, A. (2021). Towards protecting organisations’ data by
preventing data theft by malicious insiders. International Journal of Organizational
Analysis.
Barona, R., & Anita, E. M. (2017, April). A survey on data breach challenges in cloud
Computing security: Issues and threats. In 2017 International conference on circuit,
power and computing technologies (ICCPCT) (pp. 1-8). IEEE.
Belyh, A. (2020). Cloud Encryption: Challenges and Recommendations. Retrieved from
https://www.cleverism.com/cloud-encryption-challenges-and-recommendations/
Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges,
prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and
Knowledge Discovery, 7(5), e1211.
Rashid, A., & Chaturvedi, A. (2019). Cloud computing characteristics and services: a brief
review. International Journal of Computer Sciences and Engineering, 7(2), 421-426.