Cheap Essay logo
  • Home
  • Custom Papers
  • Dissertation Help
  • Essay Writing
  • My account
  • Order now
Order Now
Uncategorized

2 replies each 100 words

4 min read
Posted on 
September 26th, 2022
Home Uncategorized 2 replies each 100 words

Learning Goal: I’m working on a humanities question and need guidance to help me learn.

Discussion

Technology’s Impact on Data Security

Technology shows a lot of impact on data security and ethics in data analytics. For every organization, data has become a necessity where the amount of data is rapidly increasing but not reducing every day. Technology evolution generates some better methodologies, especially for data security in companies. Generally, data security is completely dependent on technology in a way to generate reliable and effective data security for organizations. For enhancing the data security system, the data encryption technology, along with motion detectors, facial recognition, fingerprints, sensors, etc., plays an eminent role, especially for accessing the information only by authorized users. This shows that data security is developed because of technology (Fernando, Chidambaram, & Sari, 2018). The best example is email, where communication can be done effectively between multiple business entities. But the email communication has become an easy target for most hackers who can easily gain access and use it to capture unauthorized information. Hackers employ some phishing activities, especially for accessing information. To overcome this type of unauthorized activity, it is eminent that companies need to use encryption techniques that allow only authorized users to access the information (Fernando, Chidambaram, & Sari, 2018).

Data ethics is one of the critical approaches which mainly focuses on improving data security effectively. Data ethics is a process that is used to recommend the correct or wrong ways of accessing or using restricted information. The main data ethics approach is to perform close monitoring and guide the users regarding the ethical use of information. Data ethics always maintains higher integrity and privacy through which it allows only authorized members to access the available information. Technology plays an important role which generates a better and more reliable security measure for confidential information against hackers or malicious users (White, Ariyachandra, 2016).

Bottom of Form

Rithwick Kumar Marru

Discussion week 5

COLLAPSE

Top of Form

Technology advancement has brought different challenges in data security because as technology advances, other people get access to data irrespective of location. The improvement in technology that has brought computing devices such as mobile phones has enhanced the possibility of a data breach as people get access to information without practicing necessary measures to ensure data protection (Nemati, 2007). With multiple devices accessing data from different devices, it exposes database to vulnerability as attackers may access user account through unprotected Wi-Fi. Continuous advancement in technology has resulted to continuous struggled between data users and attackers. In that data, users have to seek constant improvement of technology to defend data against attackers who continuously improve their mechanism and model to attack the database quickly. This has forced the need for organization to constantly improve database to ensure they keep a better pace against attacker improvement. Despite the continuous improvement on measures that provide data security, technological advancement has also exposed data security, hence the need to keep looking for better ways of protecting sensitive data (Nemati, 2007). Technology advancement has led to modern data protection methods such as encryption, cloud computing, and deceptive technology.

Technology has enabled an exponential increase in data making, and it uses. With more data being generated, there is a need for its security and ethical usage. Technology advancement has led to the need to formulate policies that will protect the use of personal data and its collection. All this is due to the interconnectivity of various data, with some being sensitive and requiring necessary precautions to see to it that users and owners are not exposed to insecurities. Technology has changed who is responsible for the data, unlike traditionally, where data security and protection were the roles of data handlers, archivists and IT specialties. Today is the responsibility of every individual with access to data to protect it hence the improvement in ethical handling of information (Ash et al., 2018). Employees have to be on their best behavior a trustworthy to ensure data security. Ethics in handling data has to be adhered to and observed. In contemporary society, data security and ethics have become everyone’s responsibility.

References

Ash, J., Kitchin, R., & Leszczynski, A. (Eds.). (2018). Digital geographies. Sage.

Nemati, H. (Ed.). (2007). Information security and ethics: concepts, methodologies, tools, and applications: concepts, methodologies, tools, and applications. IGI Global.

Order an Essay Now & Get These Features For Free:

Turnitin Report

Formatting

Title Page

Citation

Outline

Place an Order
Share
Tweet
Share
Tweet
Calculate the price
Pages (275 words)
$0.00
Cheap Essay
Company
  • About Us
  • Coursework Writing
  • Custom Papers
  • Dissertation Help
  • Dissertation Writing
  • Essay Writing
Legal
  • Term Papers
  • Terms
  • Thesis Format
  • Thesis Statement
  • Why Choose Us
  • Write My Essay
How Our Service is Used:
Cheap Essay essays are NOT intended to be forwarded as finalized work as it is only strictly meant to be used for research and study purposes. Cheap Essay does not endorse or condone any type of plagiarism.
Subscribe
No Spam
© 2023 Cheap Essay. All rights reserved.
Cheap Essay will be listed as ‘Cheap Essay’ on your bank statement.