Description
The world of technology is changing at an unprecedented pace, and these changes represent business opportunities as well as challenges. Mass connectivity and faster speeds create opportunities for businesses to network more devices, complete more transactions, and enhance transaction quality. Internet Protocol version 6 (IPv6) and internet of things (IoT) are two such technologies that represent significant opportunities for strategic cybersecurity technology professionals to create lasting value for their organizations.
IoT is the phenomenon of connecting devices used in everyday life. It provides an interactive environment of human users and a myriad of devices in a global information highway, always on and always able to provide information. IoT connections happen among many types of devices—sensors, embedded technologies, machines, appliances, smartphones—all connected through wired and wireless networks.
Cloud architectures such as software as a service have further enabled big data analytics and improvement in areas such as automated manufacturing. Data and real-time analytics are now available to workers through wearables and mobile devices.
Such pervasive proliferation of IoT devices gives hackers avenues to gain access to personal data and financial information and increases the complexity of data protection. Given the increased risks of data breaches, newer techniques in data loss prevention should be examined.
Increased bandwidth and increased levels of interconnectivity have allowed data to become dispersed, creating issues for big data integrity. In such a world, even the financial transactions of the future are likely to be different—digital currencies such as Bitcoin may be used for some future financial transactions.
To survive and thrive, organizational technology strategists must develop appropriate technology road maps. These strategists must consider appropriate function, protection, and tamper-proofing of these new communications and transactions.
It will be impossible to protect data by merely concentrating on protecting repositories such as networks or endpoints. Cybersecurity strategists have to concentrate on protecting the data themselves. They will need to ensure that the data are protected no matter where they reside.
In this project, you will work with team members to compile a technology strategy plan for your organization to protect data throughout the company. This project will take about two weeks to complete. There are 10 steps in the project, which will include a 12- to 15-page report, slide presentation, and lab report. First, begin with the project scenario above, and then move to Step 1, where you will be assigned roles within your team and sign the team project charter.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Please view explanation and answer below.Kindly find the attached answers, and explanation.
Running head: DATA LOSS PREVENTION
1
Data Loss Prevention
Name
Institutional Affiliation
DATA LOSS PREVENTION
2
Data Loss Prevention
Introduction
There are continuous changes that are happening in the field of technology as of today
both because of the continued advancements in technology by the people which is posing both
advantages and risks to organizations. The increase in the number of internet users and the
fast speed of the internet has enabled both businesses, and the people to join the new internet
wave (UMGC, 2021). My company is investing in mass connectivity and data loss prevention.
We have been tasked with compiling a technology strategy plan to install IPv6, internet of
things (IoT), and data loss prevention techniques that will include data governance,
Blockchain, data masking, tokenization, data obfuscation, and more as detailed within the
report to prevent the loss of data for our company. This report covers a strategy plan for the
organization to protect data throughout the company. This report is accompanied by a power
point presentation which is an executive briefing to management. The report will also be
accompanied by Lab results of each individual member of the team.
Devices and Technologies
The term data loss prevention (DLP) refers to a set of procedures ensured by
organizations to make sure that their sensitive organization data is not lost hacked by an
authorized individuals. According to Groot (2020), there are many technologies that help in data
loss prevention. These technologies monitor organization’s networks, data sharing, company
data in the cloud, and all other data forms.
Internet Protocol Version 6 (IPv6)
DATA LOSS PREVENTION
3
IPV6 is the latest version of the Internet Protocol (IP) developed. The data protection
software was developed to replace the old version of IPV4. IP is communications means which
enables technological devices to locate and connect together online. IPv6 identifies IP addresses
from 32 bits to 128 bits, thus ensuring the visibility of computer network addresses regardless of
physical boundaries. IPv6 identifies a larger number of IP addresses with the help of 128-bit
addresses. This large extension of IP address identification enables scalability and it further
ensures strong data security as it guarantees scanning of the host server which makes it tricky for
attackers to hack. Sophos (n.d) says that IPv6 contains an integrity check list that helps to check
the integrity of logging in users, and a running end-to-end encryption in its virtual private
networks. These features are available for all connections and supported by well-matched
systems and devices. This encryption makes it difficult for hackers to now hack into the
computers system. For example, we will use the Secure Neighbor Discovery (SEND) protocol
which ensures that the cryptographic authorization of the hosting server is indeed authentic.
Internet of Things (IoT)
The internet of things (IoT) describes the practice of linking technological devices used
in information sharing in everyday life from home devices, corporate to industrial devices. The
Internet of Things enables individuals, corporates, and businesses to easily share information in
what is referred to as today’s global village (UMGC, 2021). The connections of IoT involves
different forms of technological devices which among others include embedded technologies,
sensors, smartphones, and computers that are linked together using both wireless, and wired
networks. While using the Internet of Things, architecture in the Cloud for example the use
software allow big data analytics and improve activities like automated manufacturing. The
DATA LOSS PREVENTION
4
UMGC (2021) notes that real-time analytics, and data can now be accessible to workers using
mobile devices like phones, and wearables.
Using low-cost computing, big data, the cloud, mobile devices, analytics, and users can
gather, and share information with little to no human intervention. In today’s digital world,
technological devices are able to monitor, record, and change every communications between
connected things. With IoT, hackers can hack into computer systems and misuse the information
of individuals or companies while an authorized. Given that there are many technological
devices connected to the internet today, there is no doubt that misuse of personal or company
information is possible. According to Paloalto, (2021), there are measures that can be
implemented to secure IoT devices in an enterprise. These include the application of tools that
can identify the visibility of hackers, using network segmentation to guarantee data safety, and
adopting strong password practices, continuing to patch and always updating the company’s
firmware, always actively monitoring IoT devices and using strong encryption like WPA2 for
Wi-Fi. In addition, setting up guest network for guests, using multi-factor authentication,
changing default settings are measures that can also be taken to secure IoT devices (Norton,
n.d.).
Data Loss Prevention
According to Proofpoint (2021), data loss prevention (DLP) ensures users do not send
sensitive or critical information outside the corporate network. DLP describes software products
that help a network administrator control the data that users can transfer. The good news with
many of the data loss protection software’s is that they use business data management
regulations that are designed to protect critical and important organizational information not for
DATA LOSS PREVENTION
5
hackers or ineligible users to access it. Like many other firms, we are implementing DLP to
prevent any imaginable insider risks of data breaching by our very own team members
(Takebayashi et al., 2010). As a result of the dispersion of data in different geographic regions,
and the intricacy of today’s internet data hacks, more superior, and sophisticated data loss
prevention software’s are being invented. In relation to our case, DLP strategies will focus on
data safety, and not the enterprise networks or storage endpoints. Today, Information technology
is certainly the basis for all successful businesses. Yet again, IT is prone to security breaches of
data by both internal and external members (Choi, Kaplan, Krishnamurthy, &, Lung, 2019). That
said, the safety of company information is thus an important consideration to take into account
by everyone business in today’s business environment.
Authentication is one of the information system's security principles. This helps to
prevent unauthorized people from having access to an institution's services. Password
authentication based on smart cards is one of the easiest and most common ways of
authentication. Smart cards are also identity carriers that contribute fully to safeguarding access
through high authentication of two-factor models. There are sensitive places in the company t
and about the business world for instance which call for high security of the stored information.
These could include the company’s strategic future plans, marketing plans, intellectual properties
of the organization, and top level decisions that the company intends to implement in the future.
That is, the system must choose who and what service can access (Norton, n.d). Each user can
use an exclusive phone app system. In view of our company, the telephone app-based system
will include personal data and its role on the platform (IT technicians, or administrator,
managers, and employees). Services do however necessitate an adequate level of safety.
DATA LOSS PREVENTION
6
The Multifunctional Smartphone App-based architecture is another technological tool
that can be used in data prevention. This data loss prevention digital App relies on public key
infrastructure technologies for smart devices to guarantee data protection through authentication
and real-time access to several users using different levels of classification. Public Key
Infrastructure (PKI) is a complete structure that requires uses to indicate their digital signatures
as well as public key encryption (Venafi, 2020). This uses the standard ISO 7498-2 for open
systems security architecture. The electronic signature is a strong and individual identity that
makes use of the PKI technology. Non-renewal, authentication, and integrity is possible in the
process of the electronic signing course. The electronic signature will be made up of more other
features including an electronic certificate. Moreover, the credential allows the signatory to be
authenticated, and a certifying authority is signed (CA). The certificate is saved in this approach
in the user's phone app. The smartphone app-based system is used to authenticate the user by
having a private key remaining exclusively utilized by the owner.
Google Authenticator
Authenticator is a Google software-based authenticator that implements a two-stage
verify using a Time-based One-time Password Method (TOTP) for the verification of software
application users, a one-time password algorithm, and a one-time HMAC (HOTP) (GitHub,
2020). It produces a six to eight-digit one-time password which users can input in addition to
their usual login data when logged into a site that support Authenticator, or use an Authenticatorsupported third-party program such as password managers or file hosting services. If a Trojan
compromises the computer that is used for the login procedure, then a Trojan can collect the
username, password and once password.
DATA LOSS PREVENTION
7
Big Data Analytics
Big data refers to large sums of data which is not stored in our daily storage databases for
capturing, managing, and processing of the data. The common examples of big data are high
variability, large volume, and high speed. Big data analytics uses strong data analytic methods
against large, diverse big data sets that include structured, semi-structured and unstructured data,
from different sources, and in different sizes from terabytes to zettabytes (IBM n.d.). The data
tool will thus be helpful to us as regards ensuring the safety of large sums of our company’s data
in particular.
Blockchain
Blockchain is a shared, unhampered ledger that enables the recording of business
transactions as well as monitoring of chattels in a network of business. According to IBM (n.d),
all valuable assets and/or information can be monitored and transacted via the Blockchain
technology with minimal risks and costs charged. The faster and more accurate a business
receives information, the better. Blockchain is preferred for transmitting information since it
offers immediate, shared and completely transparent information stored on an immutable ledger
that can be accessed only by permissioned network members (IBM, n.d.). Blockchain technology
is commonly being used in healthcare facilities, and other business settings to make sure there is
privacy, integrity, and privacy of patient records. In relation to our business setting, Blockchain
technology will be used in the transfer of our clients’ information to ensure its safety.
Data Obfuscation and Data Masking
The term data obfuscation explains the practice through which data important data is
hidden while keeping a few features for use. The expression "data obfuscation" and "data
DATA LOSS PREVENTION
8
masking" are always used together. However, data masking equally means obfuscation if it is
used for testing aims (Xplenty, 2021). As a result, we need to hide some of our organizational
data from hackers, more so our important organizational data or and information relating to our
team members, and other stakeholders for data security reasons and compliance with the laws
that govern data protection.
Data Governance
According to Informatica (2013), data governance is a process that involves the
continued monitoring for the use and storage of data, where it is stored, the reliability of the data
and as well as maintaining its importance to the intended users. Under data governance, we will
make sure that only data with integrity is input into intelligence engines and data analytics for the
making of high-value data-informed decisions.
DLP systems confront numerous obstacles in protecting sensitive data from loss, which
might render the system ineffective. Leaking channels, the human aspect, access rights,
encryption and steganography, data manipulation, scalability and integration, and data
classification are all examples of these (Takebayashi et al., 2010). Implementing a general
method and value proposal for DLP based on the assessment of the risks of data loss with an IT
knowledgeable...