Top Special Offer! Check discount
Get 13% off your first order - useTopStart13discount code now!
Experts in this subject field are ready to write an original essay following your instructions to the dot!
Hire a WriterThe research paper covers the content of the cybers security technology. The organization plans on identifying and evaluating the various techniques that may be used by the organization to prevent data loss. The new software that the organization plans on using will play a significant role in preventing loss of data in the organization as it will significantly ensure that organizational data will be protected from competitors and people who might have malice. The organization has set a well drafted strategic procedure that plans on utilizing the transformational type of leadership. The strategic plan will ensure that it extensively covers the various data transmission technologies planned by the organization. The techniques that are to be used by the organization are Blockchain technology, data masking, and tokenization technology. In the implementation of the strategic plan, the organization will have to evaluate the various data prevention loss technologies. The management of the organization will apply the SWOT analysis to assess the implementation of the strategic plan extensively. The team plans on evaluating the strength, the weaknesses, the opportunities and the potential threats that might either derail or positively affect the implementation of the strategic plan. The research paper will also give the management a brief description of the three technologies that the organization is planning to use on preventing data loss in the organization. The data loss prevention technology that is about to implemented by the company will have to assess the various government policies that are present in the market.
Executive Summary
Most organizations tend to face the loss of data which might end up in the wrong hands. The loss of data tends to either negatively or positively affect the company’s operation. Data which may tend to fall into the wrong hands affects the public image of the organization adversely. Therefore, organizations usually feel the need of incorporating the data loss prevention technology to curb the issue at hand. The organization is planning on using blockchain technology, data making and tokenization technology to prevent data loss in the organization. The tainting of the public image usually gives their competitors an upper hand regarding competition. The competitors typically end up gaining the market share that is present while the organization tends to lose their market share.
The need for an organization to create a strategic plan that will enable the organization to Organizations has created a transformation kind of leadership where the organization plans on building a strategic plan that is all inclusive by the organization. The comprehensive strategic plan will prove to be useful as it will cover the various section that is on the market. SWOT analysis will be vital to the organization in the implementation of the plan. SWOT analysis can evaluate the strength, weakness, opportunities that might be present and threats that the strategy procedure might face in its execution.
The strategic plan will also evaluate the available government policies that may affect implementation of the program. The government has laid out procedures and policies that guide the use of the data loss prevention technologies. The mission and goals of the organization will also be aligned with the primary aim of accommodating the set government policies. The organization will ensure that it complies with the relevant regulations that have been set by the government.
Devices and Technologies
Data loss prevention is a technique that is usually created to ensure that the end users cannot access sensitive information that might be vital to the company. The data loss prevention method provides the management, and the employees can protect information that might affect the organization negatively if the information falls into the wrong hands. The data loss prevention method usually includes all stakeholders in the organization to ensure that the strategic plan is practical and workable to the organization. Data loss prevention technique of the organization will use the various cybersecurity technologies to protect the security of its data from outsiders and most competitors. In the organization, the data loss technologies will include blockchain technology, data making, and tokenization technology. Data loss technology is essential in protecting the data of the organization.
Technology 1
Blockchain technology is the type of technology which is digitalized and decentralized in transactions that are cryptocurrency related. The blockchain technology tends to record the operations in a chronological order thus making it easier to accessed and understood by the organizational team. The blockchain technology also assists the organization in keeping a track record of the transactions. The blockchain technology also helps the organization to maintain a centralized track record of the cryptocurrency transactions (Pilkington 2016). The technology enables the organization to interconnect the various computers that are present in the organization. The blockchain technology ensures only the employees of the organization can access the transactional data of the organization (Pilkington 2016). The technology also allows automatic downloading of the transactions that take place in the organization.
Technology 2
Data masking is the technology that creates mimics a similar but fake version of the company’s information. The technique usually aims at protecting the real information of the organization. Data masking is generally very essential for the testing of software’s and training the training the users of the software (Ahuja 2016). The primary purpose of the software technology is protecting the real data by providing substitute data. Data masking is usually very essential in protecting the data from the organization’s main competitors.
Technology 3
Tokenization is the type of data protection where the organization substitutes data that is considered to be sensitive to the organizations and the replacing the raw data with the non-sensitive data. The renewed non-sensitive information is usually known as the token (Tokenization 2011).
Technology Goals and Objectives
The organization plans on creating a sustainable economy by ensuring the organization remains relevant in the market. Regarding the organization remaining relevant to the market, the organization needs to ensure that sensitive data is protected from main competitors and members of the public. The data to be protected by the management ranges from the transactions to the strategic plans of the company.
Deploying.
The organization will strategically put in place the data protection technologies to ensure efficiency in achieving their set goals in the organization.
Maintaining.
The organization plans on recruiting highly skilled labor to maintain the technologies that are to be implemented by the organization. The management will also train the various employees on the best methods of using the software to ensure the implementation are in line with the organizational goals (Bailey 2015). The organization will frequently maintain the technologies of the organization.
Securing.
The organization plans on ensuring the infrastructure of the organization are frequently updated to provide that efficiency of the organization. The infrastructure needs to be highly secured regarding protecting data loss by the organization.
Impact on Infrastructure.
The infrastructure of the organization will reduce data loss by the organization. The foundation will be incorporated and integrated with the existing data technologies infrastructure to ensure the protection of data which will possibly minimize data loss by the organization.
Impact on Security.
The blockchain technology will ensure the protection of the transactional data of the organization. The data masking technology will provide the dummy information and thus protect the real information.
Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis
Blockchain technology
SWOT Analysis for Technology 1
Strengths
Blockchain technology will enable the organization to protect the transactional information of the organization.
Weaknesses
Blockchain technology does not guarantee the protection of customers from other competitors.
Blockchain technology is relatively slow in its usage.
Blockchain technology may prove to be expensive to the organization
Opportunities
Blockchain technology can be essential for the organization when the organization plans on investing in cryptocurrency.
Threats
The possibility of the various employees not having the adequate knowledge of using the blockchain technology.
Table 1: SWOT Analysis for Technology 1 (Reference, 2017a)
Data Masking
SWOT Analysis for Technology 2
Strengths
Data masking as can protect the real information of the organization by mimicking the actual data of the organization.
Weaknesses
Data masking may not eradicate all the information that may prove to be sensitive to the organization.
Masked data might expose the organizational information.
Users of the software technology may fail to comply with the standards.
Opportunities
Data masking is usually very essential in the storage of organization information from potential threats.
Threats
The exposure of the organization information to the competitors in the market.
Table 2: SWOT Analysis for Technology 2 (Reference, 2017b)
Tokenization
SWOT Analysis for Technology 3
Strengths
Tokenization ensures the protection of internal data.
Tokenization ensures that retailers comply with the various governmental regulations.
Tokenization can be integrated with other technologies in the organization.
Weaknesses
The presence of cryptocurrency reversals in the market due to the use of tokens.
Lack of adequate skills to utilize the tokenization system by the retailers.
Opportunities
Ensures that the organization should be able to maintain its competitiveness in the organization.
Threats
The usage of tokens ha proved to be troublesome to most merchants.
Table 3: SWOT Analysis for Technology 3 (Reference, 2017c)
Data Flow Diagram
Figure 1. Data Flow Diagram (UMUC, n.d.)
Governance, Risk, and Compliance (GRC) Issues
The Government Risk and Compliance framework entail the organization incorporating the corporate governance to ensure the success of the data loss protection program that is to be implemented.
Governance
The corporate governance set by the organization will ensure the organization will integrate the blockchain technology, tokenization, and data masking with existing technologies that have been used by the organization previously. Implementation of the multiple new technologies will have to follow the solid strategic plan to ensure it is well managed. The organization will have
Describe how governance will be affected by the next technologies. Describe the management that applies to your companies and how the compliance with that governance will change with the implemented technologies and what steps your company will take to ensure you come back into compliance with the governance.
Risk
Implementation of the new technologies that protect the organizational data will face multiple threats. The new technologies that are to be introduced by the organization will require highly skilled staff to implement the data loss strategic plan (Bailey 2015). Technologies such as the break chain technology will entail the employees having a broad knowledge of how best the technology might work. The various technologies have various threats that may affect the implementation of the new data protection project.
Compliance
The technological infrastructure of the organization will have to be reviewed by the management of the organization to ensure the success of the new technological equipment that will ensure the protection of data. The technologies will ensure that the technologies comply with the set regulations set by the government. The main agenda of the new technology is to protect essential data by the organization.
Conclusion
Implementation of the new technologies of data protection will prove to be essential to the organization. The data prevention strategy will ensure the organization will incorporate the use of blockchain technology, tokenization and data masking by the organization. The new technologies that are to be implemented should ensure the employees can maneuver around the latest technologies. The new technologies will play a vital role in protecting the data of the organization from various unscrupulous people. The organization needs to evaluate the possible risks that may affect the data loss strategic plan that is to be implemented by the organization.
References
Ahuja, R. P. S., Jha, B., Maini, N., Patel, S., Jain, A. R., Hegde, D. K., ... & Pawar, A. V. (2016). U.S. Patent No. 9,430,564. Washington, DC: U.S. Patent and Trademark Office.
Bailey, B. T., Romer, J., Doyle, C., Gifford, J., & Zibart, K. (2015). U.S. Patent No. 8,943,574. Washington, DC: U.S. Patent and Trademark Office.
Pilkington, M. (2016). 11 Blockchain technology: principles and applications. Research handbook on digital transformations, 225.
Tokenization, P. (2011). Securing Sensitive Data for PCI. HIPAA and Other Data Security Initiatives, 13.
Yli-Huumo, J., Ko, D., Choi, S., Park, S., & Smolander, K. (2016). Where is current research on blockchain technology?—a Systematic review. PloS one, 11(10), e0163477.
Hire one of our experts to create a completely original paper even in 3 hours!