数据隐私与安全:技术与挑战综述

Oluwatoyin Ajoke Fayayola, Oluwabukunmi Latifat Olorunfemi, Philip Olaseni Shoetan
{"title":"数据隐私与安全:技术与挑战综述","authors":"Oluwatoyin Ajoke Fayayola, Oluwabukunmi Latifat Olorunfemi, Philip Olaseni Shoetan","doi":"10.51594/csitrj.v5i3.909","DOIUrl":null,"url":null,"abstract":"In today's interconnected digital world, data privacy and security have emerged as paramount concerns for individuals, organizations, and governments alike. This review provides a comprehensive review of techniques and challenges surrounding data privacy and security in information technology (IT) systems. The review begins by outlining the significance of data privacy and security in IT, emphasizing the proliferation of sensitive information stored and transmitted across various digital platforms. With the exponential growth of data collection, storage, and processing, ensuring the confidentiality, integrity, and availability of data has become imperative. Next, the review delves into the techniques employed to safeguard data privacy and security in IT environments. Encryption techniques, such as symmetric and asymmetric cryptography, play a crucial role in protecting data from unauthorized access and interception. Additionally, access control mechanisms, including authentication and authorization protocols, help manage user privileges and restrict unauthorized entry into sensitive data repositories. Furthermore, anonymization and pseudonymization techniques are utilized to conceal personally identifiable information (PII) and mitigate the risk of identity theft and privacy breaches. Moreover, the review discusses the challenges associated with data privacy and security in IT ecosystems. These challenges include the evolving nature of cyber threats, such as malware, ransomware, and social engineering attacks, which constantly test the resilience of IT defenses. Additionally, compliance with regulatory frameworks, such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA), presents significant challenges for organizations striving to adhere to stringent data protection standards while maintaining operational efficiency. Furthermore, emerging technologies, such as the Internet of Things (IoT) and artificial intelligence (AI), introduce novel security risks and privacy concerns due to their interconnected nature and reliance on vast amounts of data. In conclusion, the review underscores the critical importance of continuously evaluating and enhancing data privacy and security measures in IT systems to mitigate risks, comply with regulations, and foster trust among stakeholders in an increasingly digitalized world. \nKeywords: Data, Privacy, Security, IT, AI.","PeriodicalId":282796,"journal":{"name":"Computer Science & IT Research Journal","volume":"20 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DATA PRIVACY AND SECURITY IN IT: A REVIEW OF TECHNIQUES AND CHALLENGES\",\"authors\":\"Oluwatoyin Ajoke Fayayola, Oluwabukunmi Latifat Olorunfemi, Philip Olaseni Shoetan\",\"doi\":\"10.51594/csitrj.v5i3.909\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's interconnected digital world, data privacy and security have emerged as paramount concerns for individuals, organizations, and governments alike. This review provides a comprehensive review of techniques and challenges surrounding data privacy and security in information technology (IT) systems. The review begins by outlining the significance of data privacy and security in IT, emphasizing the proliferation of sensitive information stored and transmitted across various digital platforms. With the exponential growth of data collection, storage, and processing, ensuring the confidentiality, integrity, and availability of data has become imperative. Next, the review delves into the techniques employed to safeguard data privacy and security in IT environments. Encryption techniques, such as symmetric and asymmetric cryptography, play a crucial role in protecting data from unauthorized access and interception. Additionally, access control mechanisms, including authentication and authorization protocols, help manage user privileges and restrict unauthorized entry into sensitive data repositories. Furthermore, anonymization and pseudonymization techniques are utilized to conceal personally identifiable information (PII) and mitigate the risk of identity theft and privacy breaches. Moreover, the review discusses the challenges associated with data privacy and security in IT ecosystems. These challenges include the evolving nature of cyber threats, such as malware, ransomware, and social engineering attacks, which constantly test the resilience of IT defenses. Additionally, compliance with regulatory frameworks, such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA), presents significant challenges for organizations striving to adhere to stringent data protection standards while maintaining operational efficiency. Furthermore, emerging technologies, such as the Internet of Things (IoT) and artificial intelligence (AI), introduce novel security risks and privacy concerns due to their interconnected nature and reliance on vast amounts of data. In conclusion, the review underscores the critical importance of continuously evaluating and enhancing data privacy and security measures in IT systems to mitigate risks, comply with regulations, and foster trust among stakeholders in an increasingly digitalized world. \\nKeywords: Data, Privacy, Security, IT, AI.\",\"PeriodicalId\":282796,\"journal\":{\"name\":\"Computer Science & IT Research Journal\",\"volume\":\"20 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-03-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Science & IT Research Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.51594/csitrj.v5i3.909\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science & IT Research Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.51594/csitrj.v5i3.909","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在当今互联互通的数字世界中,数据隐私和安全已成为个人、组织和政府最关心的问题。本综述全面回顾了信息技术(IT)系统中与数据隐私和安全有关的技术和挑战。综述首先概述了信息技术中数据隐私和安全的重要性,强调了在各种数字平台上存储和传输的敏感信息的激增。随着数据收集、存储和处理的指数级增长,确保数据的保密性、完整性和可用性已成为当务之急。接下来,我们将深入探讨在 IT 环境中保护数据隐私和安全所采用的技术。对称和非对称加密技术等加密技术在保护数据免遭未经授权的访问和截取方面发挥着至关重要的作用。此外,访问控制机制,包括身份验证和授权协议,有助于管理用户权限和限制未经授权进入敏感数据存储库。此外,匿名化和假名化技术可用于隐藏个人身份信息(PII),降低身份盗窃和隐私泄露的风险。此外,综述还讨论了 IT 生态系统中与数据隐私和安全相关的挑战。这些挑战包括网络威胁的不断演变,如恶意软件、勒索软件和社交工程攻击,它们不断考验着 IT 防御系统的应变能力。此外,《通用数据保护条例》(GDPR)和《健康保险便携性和责任法案》(HIPAA)等监管框架的合规性也给努力遵守严格的数据保护标准同时保持运营效率的企业带来了巨大挑战。此外,物联网 (IoT) 和人工智能 (AI) 等新兴技术由于其相互关联性和对海量数据的依赖,也带来了新的安全风险和隐私问题。总之,本综述强调了在日益数字化的世界中,持续评估和加强 IT 系统中的数据隐私和安全措施以降低风险、遵守法规并促进利益相关者之间的信任至关重要。关键词数据、隐私、安全、IT、人工智能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
DATA PRIVACY AND SECURITY IN IT: A REVIEW OF TECHNIQUES AND CHALLENGES
In today's interconnected digital world, data privacy and security have emerged as paramount concerns for individuals, organizations, and governments alike. This review provides a comprehensive review of techniques and challenges surrounding data privacy and security in information technology (IT) systems. The review begins by outlining the significance of data privacy and security in IT, emphasizing the proliferation of sensitive information stored and transmitted across various digital platforms. With the exponential growth of data collection, storage, and processing, ensuring the confidentiality, integrity, and availability of data has become imperative. Next, the review delves into the techniques employed to safeguard data privacy and security in IT environments. Encryption techniques, such as symmetric and asymmetric cryptography, play a crucial role in protecting data from unauthorized access and interception. Additionally, access control mechanisms, including authentication and authorization protocols, help manage user privileges and restrict unauthorized entry into sensitive data repositories. Furthermore, anonymization and pseudonymization techniques are utilized to conceal personally identifiable information (PII) and mitigate the risk of identity theft and privacy breaches. Moreover, the review discusses the challenges associated with data privacy and security in IT ecosystems. These challenges include the evolving nature of cyber threats, such as malware, ransomware, and social engineering attacks, which constantly test the resilience of IT defenses. Additionally, compliance with regulatory frameworks, such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA), presents significant challenges for organizations striving to adhere to stringent data protection standards while maintaining operational efficiency. Furthermore, emerging technologies, such as the Internet of Things (IoT) and artificial intelligence (AI), introduce novel security risks and privacy concerns due to their interconnected nature and reliance on vast amounts of data. In conclusion, the review underscores the critical importance of continuously evaluating and enhancing data privacy and security measures in IT systems to mitigate risks, comply with regulations, and foster trust among stakeholders in an increasingly digitalized world. Keywords: Data, Privacy, Security, IT, AI.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Role of pandemic in driving adoption of artificial intelligence in healthcare industry Challenges and strategies in securing smart environmental applications: A comprehensive review of cybersecurity measures Advances in machine learning-driven pore pressure prediction in complex geological settings Data science's pivotal role in enhancing oil recovery methods while minimizing environmental footprints: An insightful review Machine learning software for optimizing SME social media marketing campaigns
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1