Preventing Data Breaches: Effective Strategies for Secure File Transfer Tool Implementation
Keywords:
data breaches, security challenges, privacy, authentication, secure file transfer, transfer protocolsAbstract
Data breaches are the primary concern for organizations and significant resources need to be allocated to protect data files doing file transfer. This writing is all about identifying the challenges and the adoption of effective measures. It’s about how useful tools can help to restrict access to unwanted actions. These measures are instance, encryption, RBAC, MFA, validations, audit trails, and employee training to help to mitigate the issues using effective implementations. Although organizations nowadays are exposed to multiple high-end technologies but are mainly restricted due to limited resources such as cost and limited human resources. The given research also presents the best practices that can be followed for effective implementation to protect data during file transfers.
References
R. Ayyagari, "An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights," Journal of Information Privacy and Security , vol. 8, no. 2, pp. 33-56, 2012.
B. Ross, E. Arslan, B. Zhang and T. Kosar, "Managed File Transfer as a Cloud Service," in Cloud Computing for Data Intensive Applications, Springer Science+Business Media New York, 15 Nov 2014, pp. 379-399.
M. Abdalla, M. Bellare and G. Neven, "Robust Encryption," Journal of Cryptography, vol. 31, pp. 307-350, 12 Jun 2017.
L. Cheng, F. Liu and D. (. Yao, "Enterprise data breach: causes, challenges, prevention, and future directions," Data Mining and Knowledge Discovery, 09 Jun 2017.
R. Sen and S. Borle, "Estimating the Contextual Risk of Data Breach: An Empirical Approach," Journal of Management Information Systems, vol. 32, no. 2, 28 Aug 2015.
S. Kang, J. Kim and M. Hong, "Go anywhere: user-verifiable authentication over distance-free channel for mobile devices," Personal and Ubiquitous Computing, vol. 17, pp. 933-943, 17 Apr 2012.
S. Jayashankar and S. T. Kandy, "Implementing Granular Access Definitions in Log Records," Computer Science and Engineering 2020, vol. 10, no. 1, pp. 22-30, 2020.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 International Journal of Computer Science and Information Technology Research
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.