Wednesday, May 6, 2020
Security Issues Dealing With Metadata - 1166 Words
Security Issues Dealing with Metadata Most companies and government agencies are collecting and storing massive amounts of information dealing with all aspects of everyday life. This information ranges from an individualââ¬â¢s movements, captured on a cityââ¬â¢s traffic cams, to details of what someone purchased at the local grocery store. Most of the information is random and anonymous however, there may be large amounts of personally identifiable information (PII) such as email addresses, birth dates, and bank card numbers as well (Damiani, Ardagna, Zavatarelli, Rekleitis, Marinos, 2016). The type and quality of information as well as the natures of the organizations collecting makes this ââ¬Å"Metadataâ⬠a desirable target for cybercriminals. Theâ⬠¦show more contentâ⬠¦The second security issue involves dishonest workers. The collection, storage, and processing of petabytes of data requires countless workers of varying skill levels and backgrounds. It is a form idable task to investigate and certify the integrity of each of these workers and the difficulty of this task is compounded by the use of external contractors and service providers. The information they are working with, adds to the problem. Although most of it is benign and mundane, it can still provide valuable marketing data to competitors (Parms, 2015). If, on the other hand, embarrassing personal information could be linked to someone famous, it could be quite profitable to the dishonest employee who leaks it. The third security issue involves poorly trained or novice employees. These employees are more likely to fall victim to social engineering or phishing schemes that can compromise your network. They are also more likely to make unintentionally make mistakes that can delete or corrupt the data stored on your network (Damiani, Ardagna, Zavatarelli, Rekleitis, Marinos, 2016). The final security issue concerns an outside attack. These attacks can be used to disrupt the busine ss or to penetrate the network and steal information. Although the anonymous information is
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.