From keyboard to cloud-base network revamped data lifecycle cybersecurity
1 Audit & Investigation Department, IIRS, Owerri, Imo State, Nigeria.
2 Department of Computer Science, FUTO, Owerri. Imo State, Nigeria.
Review Article
World Journal of Advanced Research and Reviews, 2021, 11(03), 226–233
Publication history:
Received on 10 August 2021; revised on 17 September 2021; accepted on 19 September 2021
Abstract:
This paper review seeks to identify the need for a revamped data life cycle security in the era of pervasive threat from skill cyber criminals at this time of internet of things. The motivation is to fill the knowledge gap by presenting some of the ways of data leakages and the likely protection in the organization. The aim is to present a good practice that encourages data confidentiality, acceptable use policy, knowledge of personnel and physical security policy. The building blocks of information security infrastructure across the entire organization is implemented by Enterprise Security Architecture. Rather than focus on individual functional and non-functional components in an individual application, it focuses on a strategic design for a set of security services that can be leveraged by multiple applications, systems, or business processes.
Keywords:
Cybersecurity; Cloud base network; Cyber-attack; Advanced persistent threat; Enterprise security architecture; Malware
Full text article in PDF:
Copyright information:
Copyright © 2021 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0