Technology Evaluation & Recommendation

Read Complete Research Material

Technology Evaluation & Recommendation

Technology Evaluation & Recommendation

Executive Summary

Data Integrity, confidentiality and availability are big challenges faced by most of the organizations. Integrity of data means that data cannot be changed in an unauthorized way. Confidentiality of data is the concept that data access will only be given to the authentic user. Availability of data corresponds to its timely accessibility to the user. There is a factor of secret communication in every organization. Due to this reason, organizations invest large amounts in securing, gathering, processing and storing their data and information. Among the categories of data and information, client`s confidential information holds highest priority.

Data Sharing & Storage Risks

Several risks are associated with data sharing and storage on public networks. The data stored over the network is vulnerable to the following risks (Vimercati et. al, 2012).

Confidential data stored on a server can be visible to the server as well as the unauthorized users.

The identification of queries sent over the network by a particular user may also compromise his privacy. This discloses the purpose of search.

In order to gain access to services and resources of interest over the network, a user may have to compromise on the disclosure of his identity.The server may incorrectly evaluate the query of a user on a subset of any particular data to save its computational resources. The original data file may not be fully disclosed to the user due to its division into subsets.

User`s privacy may get violated if sensitive data, associated with their identities, gets exposed.


There are many circumstances in which a system or its data may experience some kind of loss. This set of circumstances is the threats to the system. The information security threats associated with collection, processing, and storage of confidential client information include (Anonymous, 2012):

Exposure of information when using public networks

Information processed over the network can be exposed in a number of ways. It can be exposed to network-based attacks or abnormal network behavior. The hackers or professionals can have access to one`s confidential information by using modern means to get to it.


A computer virus destroys data. The virus loads itself in the computer's memory. When the original host data file executes, the virus also executes itself. This destroys the critical data.


Phishing is a technique used to have access to confidential information, E.g. usernames and passwords. In this technique, a fake user pretends to be the authentic user on the network. Phishing takes advantage of reduced usage of network`s security technology.


Eavesdropping is the process of examining packets as they travel from a source to a destination. Specific soft ware is used to monitor network. Eavesdropping grabs and alters the original sensitive data.

Comparison of Technology-based Solutions

The systems and networks in the organization should be configured with technologies to address issues of remote access, secure data and information storage, patch management etc. There are several technology-based solutions to the problem of loss of data availability, integrity and confidentiality. Every solution has its pros and cons. The following table shows a comparison of ...
Related Ads