UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 6
June-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2006061


Registration ID:
233885

Page Number

426-432

Share This Article


Jetir RMS

Title

IMPLEMENTING UNSTRUCTURED DATA SECURITY IN SMALL AND MEDIUM ORGANIZATIONS

Abstract

Abstract : Protecting data from any organization is not an easy task. It requires immense knowledge and strategies on the part of data security engineers in information and communication technologies, because many times they require very high costs and resources. protect this very valuable asset for any line of business dealing with sensitive and confidential data and information such as credit card numbers, medical information, regulated contents of state or country secrets, many of which are confused between privacy policies and data protection policies, the two concepts relate to each other because they are based on confidentiality, availability and data integrity. In recent years, due to technological advances and the globalization of electronic commerce, government policies have also changed their data protection laws in favor of technologies, in a set of millions of files that can be found in a storage place like hard drives, pen drives and more makes it imperative to define what sensitive data is? Who has access to them? Who is using it and for what purposes? With these range of questions, you will be able to define appropriate policies for tracking and monitoring to provide reliable security suggestions. The framework used in this work analyzes the behavior of users and integrated systems that access data and can alert competent entities to bad breach behavior, and to protect files and email servers from cyber-attacks and internal threats by organizations' attempts to rule access control not allowed to sensitive data.

Key Words

Organization, Data, Security, Framework, Confidentiality, Sensitive

Cite This Article

"IMPLEMENTING UNSTRUCTURED DATA SECURITY IN SMALL AND MEDIUM ORGANIZATIONS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 6, page no.426-432, June-2020, Available :http://www.jetir.org/papers/JETIR2006061.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"IMPLEMENTING UNSTRUCTURED DATA SECURITY IN SMALL AND MEDIUM ORGANIZATIONS", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 6, page no. pp426-432, June-2020, Available at : http://www.jetir.org/papers/JETIR2006061.pdf

Publication Details

Published Paper ID: JETIR2006061
Registration ID: 233885
Published In: Volume 7 | Issue 6 | Year June-2020
DOI (Digital Object Identifier):
Page No: 426-432
Country: Pemba, Cabo Delgado, Mozambique .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002937

Print This Page

Current Call For Paper

Jetir RMS