The subject of my paper is about the history and origin of protecting information resources. Data protection dated back as far as 1890 was with the U.S. Census. Then, employers used a punch card to record equipment which was known as a tabulating machine. The punch cards were used for data storage for several years. The photo below shows what a punch card looks like. (Global Data Vault, 2012)
There were enough cards to create new ones if cards were lost or destroyed which was very good for companies back then. By the 1950’s, data storage was on a magnetic reel. The reels contained anywhere from 5 MB to 150 MB. That was definitely a lot of MB for the 1950’s. During later years, data storage was used on disks. Floppy disks as they were called held a lot of data as well. I do not believe there was a way for you to lock the disk to keep others from getting the information. As I recall floppy disks had a lock to keep you from erasing the data but not locking it so that no one could access the information stored on it. Now days, there are new ways for of protecting data. Computers back in the 50’s were very expensive to maintain but now, computers are more easily to maintain and operate.
In the old days, data protection had to be loaded on to computers. We now have to install data protection for our computers. The data that was accessed in the old days processed longer than they do now. Data that is being processed is now done in real time. The current use of protecting information resources is that the current systems have to utilize and address data formatting changes. These changes are quite difficult at times. The problem with these systems are that they separate the applications which in needed for a better solution of how data protection is used.
I believe that the attitudes towards protecting information resources is serious business for companies. There is a lot at stake if the proper precautions are not taken when dealing with protecting information resources. When intentional threats come in, companies have to find out the root of the problem before it’s too late. If they do not locate the threat in time, the stored data can be corrupted and misused by unauthorized users. Companies have to make certain that they are using a secure browser and SSL (Secure Sockets Layer). This helps with distorting passwords and purchasing information. Companies and employers can also get other information tips with the BBB at http://www.bbb.org/online or the Truste site at http://www.truste.org. When going to a website, always look at the search engine when typing in the address. To make sure you are on a secure website look to see if an s is at the end of http. If there is an s then you are on a secure website.
The strengths of protecting information resources are very easy to use. To protect information that is less sensitive, you can use a password to protect your files. This can come in handy if your computer is being accessed by an unauthorized user. I believe that by using biometric security will help to enhance security on your computers and data files. Some examples of biometric security would be facial recognition, hand geometry, iris analysis, palm prints, retinal scanning, vein analysis, and voice recognition. These particular examples are quite interesting for their uses. I feel that the most effective examples of biometric security would be facial recognition, retinal scanning, and voice recognition. Facial recognition identifies the user by the shape, pattern, and facial features positions.
This is a good way to keep users from accessing information that they are not authorized to view. Facial recognition should be used at high profiled places such as military installations. The retinal scanning scans the retina with a binocular eye camera with stored data within a file. I believe that retinal scanning will become something that companies will use in the near future. Lastly, the voice recognition translates words for tone and pitch of the user. If a user does not have the correct pitch or tone, they will not have access to the files. Voice recognition is install on most cell phones which a user can say a name to activate a call. I do believe that voice recognition will be used for military installations and other companies to keep unauthorized users from accessing very important data.
The weaknesses of protecting information resources would be that technology changes daily. There is so much change users have to keep purchasing upgrades for the information security. Because technology changes quite often, nothing in this day and age will be totally secure. I say this because if a user misses an area of data that is to be protected, everything will be compromised and this can cause a problem. Some users may not understand all of what they might be dealing with. It could possibly slow down productivity if a user has to constantly use passwords. I see this to be true because when a person is trying to access important data and have to type in a password, it can become a tedious process. So that’s why I believe that companies should have a type of encrypted security when it comes to accessing important data.
Another weakness for protecting information resources is vulnerability. Vulnerability can cause harm and modifications to the information systems. Viruses, worms and other malicious programs can cause serious damage or loss of valuable information. New threats can come from unknown sources such hackers and spies who can attack the information systems. Companies also should pay close attention to blended threats. The reason why is because blended threats searches networks and embeds malicious codes into the system. Having the proper antivirus and data protection could possibly prevent data files from being destroyed. As I stated in the strengths, a company could use biometric security which could possibly eliminate future mishaps with protecting information.
The way I feel about experts viewing the future of protecting information resources is that they will see a lot more technology being used to protect data information from hackers and other unwanted users. I also feel that the experts should have a broad idea of what the future will hold for protecting information. I feel that a business continuity plan should be in effect in the future. I say this because it will help companies to prepare for disasters. Backing up files is the first most important thing to do incase of data loss.
Experts have explained that there is a higher level of data protection that will help businesses in the future. Anytime someone is on a computer or a portable device, one should back up their files just incase the computer or portable device is lost, stolen, or damaged. So if the computer or portable device is lost, stolen, or damaged, their files can be retrieved from the back up files. Companies such as Symantec, McAfee, and others have valuable information to help with data backup and protection. I use AVG on my computer and portable devices. AVG is ok, but I do not feel that my computer is not all the way protected.
Enrique Salem, the President and CEO of Symantec Corporation seem to believe that it is very possible to protect information today. In his article in SCMagazine, he states, “The future of business is right in front of us. It is virtualized, in the cloud, mobile and constantly connected. Yesterday’s enterprises were locked down and secure. Today’s enterprises are open, distributed and far less secure than they need to be. We no longer control devices, public and private cloud use is increasing, and we don’t know where our data resides. We have to find a way to adapt to these changes without compromising security.” (Salem, Enrique, 2012) “We know the “lockdown” approach no longer works. Using the cloud to store information and enabling mobility for employees creates many benefits for enterprises, such as enhanced productivity, increased convenience and lower support costs. In addition, the lockdown approach stifles all the creativity and innovation that the Digital Native generation brings.
When this generation needs a solution, they have a vast network of resources they use to find the answer. In a locked-down enterprise environment, all of those resources are closed off to them. Finally, this approach is not foolproof. Employees are already finding workarounds, whether it’s storing company files on Dropbox or consulting their Twitter networks for the answers to work-related questions.” (Salem, Enrique, 2012) I feel that Mr. Salem realizes that in this new age of technology, there are several ways that a company can secure and or protect information in the new workplace. Mr. Salem states that the information protection will have to be flexible. He also states that a sign-on needs to be simple and be able for use with all types of cloud services. Cloud services can really help a small business employees working from home or other locations. It can also help with boost a company’s productivity.
Cloud services can help employees or team members to communicate faster which will cut down on time discussing important business proposals. I noticed on Itunes and other Apple products, that there is a cloud to back up files. I do not use it however, but I may take a look at doing so soon. I would not want anyone accessing my information that is stored on my phone or on any of my other devices. I also can place some of my most important data on a jump drive. But there aren’t many jump drives that has password protection, so I do not feel I will put my “most” important information it. Mr. Salem says that there are four things that are needed to protect against threats.
And they are: A reliable early warning system that lets us know when new threats or attacks are on the horizon. State of the art protection that recognizes threats without impacting the user unnecessarily. Fast remediation solutions that move faster than the threats. Response plan- for how to react when threats do happen – the response may be internal or could require outside resources, including law enforcement. (Salem, Enrique, 2012) In conclusion, protecting information resources is very important to everyone who has access to data files. It is also very important to have the right tools to help minimize unauthorized use of data stored within files. It is amazing to know that storing data have been dated back to the 1800’s. Who knew that a simple tabulation machine would manifest into something bigger.
Bidgoli, Hossein (2012) MIS 2 2nd Edition, Cengage Learning
Global Data Vault (2012). http://www.globaldatavault.com/data-protection-whitepaper.htm
Online Privacy Alliance (2011). http://www.privacyalliance.org/resources/rulesntools.shtml
PSI (2012). The International Network of the Promotional Product Industry,
Salem, Enrique (2012). SC Magazine. Protecting information today for a secure future http://www.scmagazine.com/protecting-information-today-for-a-secure-future/article/229625/