Uncategorized

Cyber Security Protected Data

Cyber Security: Protected Data

Name:

Affiliation:

Course:

Instructor’s name:

Date:

Cyber Security: Protected Data

Protected data is any confidential and personal information given by clients during agreements with other parties involved that is subject to confidentiality to any unauthorized access or use (Asokan et al. 2011). Data security is concerned with files, databases, and accounts’ protection on a network by applying mechanisms that distinguish the relative significance of data sensitivity, regulatory adherence, varied datasets, and then adopting the most security measures to protect those resources. Data protection aims to achieve core aspects of data security: integrity, confidentiality, and availability. Data integrity facilitates reliable and accurate information (Asokan et al. 2011). The privacy element caters to accessing data by authorized individuals only while availability guarantees availability and data accessibility to fulfill business needs. The most prominent protected data include personal emails, financial statements, credit card numbers, social security numbers, student records, health records, among others. Information relating to the above examples of protected data should not be available to the general public. In other words, personally identifiable information is subject to confidentiality.

Our company is the American District Telegraph (ADT) security company. It guarantees organizations and residentials cybersecurity, protection against fire, not to mention other associated alarm monitoring services across the United States (Vaynriber et al. 2018). One of the success came from the invention of ADT elevated home intelligence, allowing homeowners to remotely access and control their security cameras, lighting, locks, thermostats, and geofences, in real-time. The company is entrusted to serving over 6 million customers across the United States. There have been significant changes in technologies raising concerns for the desire to improve data protection methods continuously. Failure to protect clients would necessarily spell the end of the company. The company is there to provide cybersecurity and other security services to its clients, and if it cannot guarantee such to its clients, what is it doing in the business? Customers are always concerned with the safety of their data. If a data breach involving a given company hit the headlines would mean that personal information will be in jeopardy and result in identity theft.

References

Asokan, N., Ginsboorg, P., Moloney, S., & Suihko, T. (2011). U.S. Patent No. 8,059,818. Washington, DC: U.S. Patent and Trademark Office.

Vaynriber, D., King, B., Molly, B. Y. E. R., North, R., & Norris, J. (2018). U.S. Patent No. 10,073,929. Washington, DC: U.S. Patent and Trademark Office.