20 Dec 2022

90

AAA Framework and Cryptography Tools/Strategies

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 922

Pages: 3

Downloads: 0

Introduction 

Information is a very important aspect of running businesses today. Some organizations depend on the information in their systems such that if it is lost, their business will fail. As such, they need service providers that can guarantee maximum protection from the information they host. An organization such as Vekta Online Solutions is tasked with ensuring that information from the healthcare institutions in America and Europe, which are its clients, will be able to protect information they have in their systems. This can be possible if a concrete data security strategy is designed.

Vulnerabilities and Threats with Data in Storage, in Transit and in Use 

Data at rest is vulnerable because it provides a more definite target for the attackers. In the case of Vekta Online Solutions, the attackers know that their clouds and servers contain information for a lot of patients and healthcare institutions all over the world (Patrick, 2014) . Thus, they could focus all of their resources on this source until they can access it. Data in transit is also very vulnerable because it provides attackers with various chances of accessing the information. They can corrupt the authenticity, integrity and confidentiality of the message and thus misinform them (Patrick, 2014) . Data in use can also be corrupted easily by attackers since being open increases the chances of it being accessible. This authorization to access the information could also be accessed from remote locations if the individual is connected to the internet and other networks.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Cryptography Tools and Strategies for Protecting Data in Storage, in Transit and in Use 

Since the organization deals with data that deserves to be private and that belongs to many institutions, data has to be secure while in the three states. Encryption is one of the tools that protects data while it is at rest and in transit (Bowman, Gesher, & John K Grant, 2011) . This can be done by both encrypting the data itself, the storage body as well as the channels using protocols such as SSL, HTTPS and TLS amongst others. Other types of data protection that uses cryptography includes the use of Virtual Private Networks and of firewalls to protect a network.

Non-Cryptographic Strategies for Storing Data at Rest, in Transit and in Use 

Non-Cryptographic strategies also help to improve security in the system. One of the ways to do this is to create policies that should be implemented throughout the company (Spivey & Echeverria, 2015) . These should be aimed at classifying the company data and thus apply the necessary data protection-methods Another strategy would be to inform the users of the system (employees) on data awareness and what their role is in the process. This way, they will not create vulnerabilities in the system and will, instead, be a source of protection thanks to their vigilance (Patrick, 2014) . It would also be important to track the information and analyze the potential vulnerabilities from afar. If it becomes possible for these individuals to detect vulnerabilities and even suspicious attacks, it will be possible for them to protect themselves accordingly.

Strategies for Supporting the AAA Framework in the Company’s Security Solution 

The AAA frameworks insists on adaptation, aggregation and arbitrage. In the case of Vekta Online Solutions, the firm has to adapt to the often increasing regulation of information handled by the healthcare institutions (Patrick, 2014) . On the other hand, the solutions should be effective enough to improve practitioner relations in the firm as well as to ensure effective outcomes when it comes to patient care. The organization should also have aggregation strategies that help to ensure that it can be able to achieve global effeciencies using its services. This can be done by designing data storage systems that are relevant and efficient. The arbitrage strategy include getting into related industries such as the nutrion’s which is also fast growing (Spivey & Echeverria, 2015) . Two tools are necessary for supporting the AAA framework include the internet and software systems which can help with the remote sharing of information within the organization’s system.

Access Control Application and Identity Management in Data Security 

Access control applications include authorization and authentication. These help promote data security through the ability to be transparent and traceable (Spivey & Echeverria, 2015) . After it has been investigated and found out that a specific site was used to access the information needed there, it can also be easily deactivated and thus the site made secure again. Vekta Online Solutions has to use them since the users connect to the internet a lot of time and could thus be hacked. Identity management also helps to provide the right information and access to the right people (Bowman, Gesher, & John K Grant, 2011) . Some information, for instance, can be seen by the CEO but not by the employees of the firm. This way, it will be tough for the wrong information to be present to the wrong people and the system would thus be safe.

Policies and Guidelines to be Included in the Organization’s Data Security Manual 

One of the policies to be included in the organization’s data security manual is the importance and necessity of a training program. HIPAA requires for the firms to ensure that they have trained their employees who handle healthcare information for their patients. Another policy would be about securing network access (Bowman, Gesher, & John K Grant, 2011) . The users in the system should be properly tracked so that each of their activities is transparent. This way they can also pay the price of any neglect.

Conclusion 

Today information is very important as it can make or break an institution. Therefore, a company such as Vekta Online Solutions have no other options but to provide the best data security possible. This can be done through ensuring that data at rest, in transit and in use are all protected by the organization from falling into the wrong hands. Strategies to use include encryption and even the implementation of security policies in the firm. With these, it will be possible for the organization to successfully lock out attackers.

References

Bowman, C., Gesher, A., & John K Grant. (2011). The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards. O'Reilly Media. 

Patrick, P. A. (2014). The Complete Guide to Healthcare Privacy and Information Security Governance. Danvers: HCPro. 

Spivey, B., & Echeverria, J. (2015). Hadoop Security: Protecting Your Big Data Platform. O'reilly Media Inc. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). AAA Framework and Cryptography Tools/Strategies.
https://studybounty.com/aaa-framework-and-cryptography-tools-strategies-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration