Concepts and Tools for Protecting Sensitive Data in the IT Industry: A Review of Trends, Challenges and Mechanisms for Data-Protection

Abstract

Advancements in storage, dissemination and access of multimedia data content on the Internet continues to grow at exponential rates, while individuals, organizations and governments spend huge efforts to exert their fingerprint in this information age through the use of online multimedia resources to propagate thoughts, services, policies, ecommerce and other types of information. Furthermore, information at different levels may be classified into confidential, sensitive and critical data types. Such data has been subject to numerous tools and techniques for providing automated information processing, information management and storage mechanisms. Consequently, numerous security tools and techniques have also emerged for the protection of data at the various organizational levels and according to different requirements. This paper discusses three important types of information security aspects that includes; data-storage, in-transit data and data access-prevention for unauthorized users. In particular, the paper reviews and presents the latest trends and most common challenges in information security with regards to data-breaches and vulnerabilities found in industry today using simple brief summaries for the benefit of IT practitioners and academics. Thereafter, state-of-the-art techniques used to secure information content commonly required in applications-software, in-house operations software or websites are given. Mechanisms for enhancing data-protection under the given set of challenges and vulnerabilities are also discussed. Finally, the importance of using information security policies and standards for protecting organizational data content is discussed along with foreseeable open issues for future work.

Authors and Affiliations

Omar Tayan

Keywords

Related Articles

Pipeline Hazards Resolution for a New Programmable Instruction Set RISC Processor

The work presented in this paper is a part of a project that aims to concept and implement a hardwired programmable processor. A 32-bit RISC processor with customizable ALU (Arithmetic and Logic Unit) is designed then th...

Quizzes: Quiz Application Development Using Android-Based MIT APP Inventor Platform

This work deals with the development of Android-based multiple-choice question examination system, namely: Quizzes. This application is developed for educational purposes, allowing the users to prepare the multiple choic...

Secure Steganography for Digital Images

The degree of imperceptibility of hidden image in the ‘Digital Image Steganography’ is mostly defined in relation to the limitation of Human Visual System (HVS), its chances of detection using statistical methods and its...

Regression-Based Feature Selection on Large Scale Human Activity Recognition

In this paper, we present an approach for regression-based feature selection in human activity recognition. Due to high dimensional features in human activity recognition, the model may have over-fitting and can’t learn...

Analysis of Accuracy and Precision of WLAN Position Estimation System based on RSS

The coordinates of the position of a wireless access point are the main goal in the wireless localization technique. In common, outdoor wireless localization techniques use the trilateration method by installing several...

Download PDF file
  • EP ID EP249030
  • DOI 10.14569/IJACSA.2017.080207
  • Views 64
  • Downloads 0

How To Cite

Omar Tayan (2017). Concepts and Tools for Protecting Sensitive Data in the IT Industry: A Review of Trends, Challenges and Mechanisms for Data-Protection. International Journal of Advanced Computer Science & Applications, 8(2), 46-52. https://europub.co.uk/articles/-A-249030