Tuesday, May 5, 2020
Security and Privacy Issues Associated for Information System
Question: Discuss about theSecurity and Privacy Issues Associated for Information System. Answer: Introduction Information and communication technologies have reformed the conventional approaches for social interaction which can be evidently observed in the magnanimous volume of users engaged on social networking websites. The report emphasizes on the topic of security and privacy issues in social media. The topic selected for the report could be validated on the grounds of social media being a major information technology that is frequently subjected to security risks (Ellison, 2007). The use of social media is largely perceived in the segment of youth which leads to prominent implications for vulnerability regarding information privacy and security. The report discusses on the topics background followed by a functional review of the issues and challenges pertaining to social media as well as the description of relevant technologies (Gangopadhyay Dhar, 2014). The background of the topic can be observed in the utilization of social media for online interaction and communication that require the user to create an online profile through which they can share information in online communications (Chang Torkzadeh, 2013). Furthermore, Kumar et al said that the increasing user base of social media sites could also be attributed to the flexibility of creating a profile in these platforms and engage in online interactions (Kumar et al., 2013). The understanding of the challenges and problems associated with social media could support the discussion by providing opportunities to clarify certain vague areas observed in the privacy and security in context of social media (Gido, Clements Clements, 2014). The prominent challenge identified in the case of security aspect of social media refers to privacy of information which can be attributed to the dramatic increase in the user participation in such sites (Sattikar Kulkarni, 2011). As per Gangopadhyay Dhar, the reforms in the privacy policies of the social media websites such as Facebook have also created formidable consequences for users. Some of the other profound threats to the security and privacy of information on social media networks such as identity theft, phishing and profiling risk were also included in the discussion to obtain comprehensive insights into the possible prevention strategies that can be presented for addressing the issue (Gangopadhyay Dhar, 2014). Furthermore the discussion would involve establishment of certain research questions pertaining to the topic that can be reflective of the approach required to be followed in the discussion(Kumar et al., 2013). The reflection on research questions enabled the acquisition of secondary information form literature review and practical examples in context of social media which supported the discussion. The discussion on the alternative technologies such as content driven platforms that involve e xamples of YouTube and Quora and the associated security and privacy issues associated with them (Kerzner, 2017). Important issues of security and privacy of social networking sites Here in this section, the core theme is being addressed that is the challenges that are related to the security and privacy related to social media. There are a number of issues related to security in social media as it covers numerous technologies such as operating systems, scheduling resources, networks, virtualization, communication, the privacy of data, memory management, management of chats, and control of data (Laudon Laudon, 2016). Hence, in social media, the security issues are applicable for most of these technologies and systems. Further, in social media due to virtualization paradigm, it leads to many concerns related to security. For instance, mapping of the machines from virtual to physical has to be carried out in a secure manner. The security of the data will be involving the data encryption along with making sure that policies that are appropriate are enforced for sharing of data (Larson Gray, 2013). In addition to this, the algorithms of memory management and alloc ation of resources are to be secured. Finally, for detection of malware in the social media the techniques of data mining might be applicable. In the intrusion detection systems, this is an approach that is adopted usually. The following shows that there are six areas in the environment of social media were particularly the software and the equipment require considerable attention for security. The six areas include securing the data when it is at rest, security the data in transit, validation of processes or users or applications, reliable separation of the data belonging to various customers, regulatory and legal issues of social media, and response to incident (Lucky, Adegoke Othman, 2014). Challenges associated with the security and privacy issues associated with social media: Privacy risks: The mechanisms that are incorporated by social media are not enough for protecting the users. The primary challenge regarding privacy is that the sites are not able to inform the users regarding the threats of spreading the personal information of the users. Security challenges: Social engineering makes use of the fake accounts for notifying the users for resetting of their accounts and even sends infected e-mails in the form of security notifications. One of the most important challenges that are faced in social media is regarding revealing of any kind of personal data (Kumar et al., 2013). Anonymity challenges: These attacks have their targets on the privacy and identity of the users. The challenges of direct attack of anonymity compromise the anonymity of the users by compromising on the location and information of the mobile device (Li et al., 2015). Impact of the issues in the real world With the kind of reports that are coming up regarding the social networking sites that are being attacked by the hackers and is being affected by the privacy issues some of the reputed sites are updating their privacy format constantly. When a third party is holding the data it is also noticed to have a lack of transparency and control potential (Schwalbe, 2015). It partly assumed that the social media can be independent of implementation, but in real transparency into the site is required by regulatory compliance. Some of the companies are encouraged by different security and privacy issues of data in maintaining the site for avoiding the above-mentioned issues. However, it is essential to address the following concerns properly. For securing the data when it is at rest the mechanisms of locking the account through the privacy settings does not actually mean that the profile is necessarily safe. The self-encrypting drives are now shipped by hard drive manufacturers, which will implement the storage standards of the trusted privacy group. The encryption hardware is created by this self-encrypting drives into the site (Snyder, 2014). This will provide the automated encryption with low-performance impact and cost. For protecting the data, however, the software encryption can be used, but it will slow down the process and is not very secure because it might give a chance to the rival in stealing the privacy data from the system without it being detected (Too Weaver, 2014). For securing the data in transit encryption is considered to be the best option. In addition to this, it is made sure by the authentication and integrity protection mechanisms that data will go only to that user to whom it has to be delivered and is not altered in transit. For any updates and uploads on the site strong authentication is an obligatory requirement. Authentication and access control are the important features in the social media environment since the data is accessible to anyone over the net. Hence, if the access of the user is cancelled then the user can be notified by the customer identity management system in real time (Tromp Homan, 2015). Even after having the privacy settings and the various measures that offered by the sites still it is considered to be one of the most important concerns. It is advised not to share the personal information. This is done for avoiding the unintentional access to the sensitive data. For separating the users, virtual machines are used by the social networking sites. In networking sites, the extremely important concerns that have security suggestions are legal and regulatory issues. In this regard, the issues that are to be considered are sharing and security of data, retention of data, identity theft, cybercrime, legal discovery, and destruction of data (Too Weaver, 2014). A trusted platform and storage module accessing techniques will be able to limit the access to the critical and sensitive data in the area of identity theft and harassment. The incident such as unexpected behaviour as a part of it the customer is required to plan for the breaching of possible social networking site security or misbehaviour of the user. For this purpose, a response that is automated or notification would be the best solution. Functional Review The functional review of the identified threats and challenges could be denoted form the lapses in the privacy and security which currently exists in the social media form the huge amount of information (Gangopadhyay Dhar, 2014). The functionality of the privacy and security norms directly associate with the restrictions regarding the convenience of theft of data and high profile information. The functionality of the privacy and security threats has the potential of disrupting systematic framework in the social media sites. Reflection As a result of the above discussions on security and privacy issues of social networking sites, it is believed that the environment is a multi-domain environment. In this, each of the domains can use diverse privacy, security, and trust requirements and it employs different mechanisms, semantics, and interfaces potentially. The services that are enabled individually or other applications are represented by these domains. It has been noticed that the technology that is naturally relevant in facilitating such kind of multi-domain formation is the service-oriented architectures with the help of service composition and instrumentation. It seems to be significant in controlling the existing research on the integration policy of multi-domain in securing data on the sites of social media and dealing with the privacy issues and the service composition that is secured for building the wideranging framework of policy-based management in the environments. It has been identified that the followi ng are some of the critical security and privacy issues in social networking sites which need to be addressed immediately for using them securely (Lucky, Adegoke Othman, 2014). Authentication and identity management: With the help of privacy settings, the users can access their personal information easily. With the help of identity management mechanism users and services can be authenticated on the basis of characteristics and credentials. Access control and accounting: As the services are diversified the access requirements to the domains are also diverse in the environment of social sites, hence it will demand an access control policy that is fine grained (Lucky, Adegoke Othman, 2014). To be specific the services are access control has to be flexible enough for capturing the context. Information sharing: The fundamental use of the social networking site is to have an interaction with people, but with various sites, the information on privacy settings will be changed. Hence it is encouraged to maintain a profile with real identities. Conclusion The social networking sites are providing the comprehensive platform for communication and at the same time, people are getting addicted to the online social media. Breaching of privacy information is becoming a threat to the users of social media. Hence it is threatening the privacy of the user. Therefore, while creating the social networking sites, it is advised to provide correct identities and has to be aware and vigilant. This is needed for the regulatory causes and for comforting the concern over the potential breaches of the data. There are many significant problems faced by the security area in establishing the correct metrics of security that is responsible for the consistent and accurate measurements. Hence it is required to evaluate the best practices and to develop the standards for making sure of the usage of the social networking sites that are secured. For the improvement in the technology and for growth in the economy it is very important in ruling out the issues that are causing the blocks to the users. References Chang, J. C. J., Torkzadeh, G. (2013). Perceived required skills and abilities in information systems project management. International Journal of Information Technology Project Management (IJITPM), 4(1), 1-12. Ellison, N. B. (2007). Social network istes: Definition, history, and scholarship. Journal of Computer?Mediated Communication, 13(1), 210-230. Gangopadhyay, S., Dhar, D. (2014). Social networking sites and privacy issues concerning youths. Global Media Journal, June, 5(1). Gido, J., Clements, J., Clements, J. (2014). Successful project management. Nelson Education. Kerzner, H. (2017). Project management metrics, KPIs, and dashboards: a guide to measuring and monitoring project performance. John Wiley Sons. Kumar, A., Gupta, S. K., Rai, A. K., Isnha, S. (2013). Social networking istes and their security issues. International Journal of Scientific and Research Publications, 3(4), 3. Laudon, K. C., Laudon, J. P. (2016). Management information system. Pearson Education India. Larson, E. W., Gray, C. (2013). Project Management: The Managerial Process with MS Project. McGraw-Hill. Lucky, E. O. I., Adegoke, O., Othman, N. (2014). Project management challenges and difficulties: A case study of information system development. International Postgraduate Business Journal, 6(1), 99-133. Li, Y., Lu, Y., Kwak, Y. H., Dong, S. (2015). Developing a city-level multi-project management information system for Chinese urbanization. International Journal of Project Management, 33(3), 510-527. Schwalbe, K. (2015). Information technology project management. Cengage Learning. Snyder, C. S. (2014). A Guide to the Project Management Body of Knowledge: PMBOK () Guide. Project Management Institute. Sattikar, A. A., Kulkarni, D. R. (2011). A review of security and privacy issues in social networking. International Journal of Computer Science and Information Technologies, 2(6), 2784-2787. Too, E. G., Weaver, P. (2014). The management of project management: A conceptual framework for project governance. International Journal of Project Management, 32(8), 1382-1394. Tromp, J. W., Homan, T. (2015). How unplanned changes emerge while implementing a Project Management Information System (PMIS) in a complex multi project RD environment. Procedia-Social and Behavioral Sciences, 194, 211-220.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.