naire for 25 employees of Information Technology Company Q1. How far do you agree with the fact that issues of data security will affect the company? Options Response Frequency No. of Respondents Total No. of Respondents Strongly Agree 42% 10 25 Agree 32% 8 25 Neutral 24% 4 25 Disagree 5% 2 25 Strongly Disagree 1% 1 25 Table 2: Issues of data security affects the company (Source: Created by self) Q2. How far do you agree that following issues affect data security most? Options Response Frequency No. of Respondents Total No. of Respondents Not secured network 38% 9 25 Using without VPN 32% 8 25 Using public computers 24% 6 25 Others 6% 2 25 Table 3: Issues affects data security by most ( Source: Created by self) 4.2 Qualitative Research Interview questionnaire for the General Manager of an IT company What are the challenges of data confidentiality that are faced in IT industries companies? “The challenges are faced that sometimes without knowing the proper process people access the system and there will be chances of many secured data getting public. Sometimes people breaches many protected information whether intentionally or unintentionally.” 3.7 Research Contribution This study developed within this data security assignment will generate the data, the software, the strategies, and the systems which are used by the multinational companies to keep the data secured in the field of Information Technology. This study will be used as an expected outcome for the value of confidential data. The study will discuss the reasons why the data in the IT companies are kept with security. The possible risks and challenges and the effects will be taken associated with security data issues in this research paper on data security assignment. Proposed Time Schedule Activities during research 1 st Week 2 nd Week 3 rd Week 4 th Week 5 th Week 6 th Week 7 th Week Selection of research topic ü Composition of the literature review ü Methodology followed in the research ü Collection of primary data for the research ü ü Data analysis and interpretation ü ü Findings ü Conclusion and Recommendation for the research study ü Final submission of the research report ü Table 1: Gantt chart References Chandrashekhar, A. M., Revapgol, J., & Pattanashetti, V. (2016). Big Data Security Issues in Networking. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), 2(1). Chatterjee, C., & Sokol, D. D. (2019). Data Security, Data Breaches, and Compliance. Data security assignment Cambridge Handbook on Compliance (D. Daniel Sokol & Benjamin van Rooij editors, Cambridge University Press, forthcoming). A. Cohen, "Cybersecurity for Critical Infrastructure: Addressing Threats and Vulnerabilities in Canada," 2019. Rosas, C. (2019). The Future is Femtech: Privacy and Data Security Issues Surrounding Femtech Applications. Hastings Bus. LJ, 15, 319. Samarati, P., di Vimercati, S. D. C., Murugesan, S., & Bojanova, I. (2016). Cloud security: Issues and concerns. Encyclopedia on cloud computing, 1-14. Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115. N. Khan and A. Al-Yasiri, “Identifying cloud security threats to strengthen cloud computing adoption framework,” Procedia Computer Science, vol. 94, pp. 485-490, 2016. N. Malik, “Distributed Computing and Security Issues in Cloud Computing,” Distributed Computing, 2019. M. Odeh, A. Garcia-Perez and K. Warwick, “Cloud computing adoption at higher education institutions in developing countries: a qualitative investigation of main enablers and barriers,” International Journal of Information and Education Technology, vol. 7, no. 12, pp. 921-927, 2017. S. D. Seifu, A. A. Dahiru, J. M. Bass and I. K. Allison, “Cloud?computing: Adoption issues for Ethiopian public and private enterprises,” Data security assignment The Electronic Journal of Information Systems in Developing Countries, vol. 78, no. 1, pp. 1-14, 2017. A. Singh, “Security concerns and countermeasures in cloud computing: a qualitative analysis,” International Journal of Information Technology, vol. 11, no. 4, pp. 683-690, 2019. Alguliyev, R., Imamverdiyev, Y., & Sukhostat, L. (2018). Cyber-physical systems and their security issues. Computers in Industry, 100, 212-223. Aljawarneh, S., & Yassein, M. (2016). A conceptual security framework for cloud computing issues. International Journal of Intelligent Information Technologies (IJIIT), 12(2), 12-24. Archibald, N. (2020). Cybersecurity and Critical Infrastructure: An Analysis of Securitization Theory. Undergraduate Journal of Politics, Policy and Society, 3(1), 39-54. Esposito, C., Castiglione, A., & Choo, K.-K. (2016). Challenges in delivering software in the cloud as microservices. IEEE Cloud Computing, 3(5), 10-14. Hurley, J. (2017). Data-Driven Approach to Protecting Critical Infrastructure. International Conference on Cyber Warfare and Security (p. 509). Academic Conferences International Limited. Hussein, N., & Khalid, A. (2016). A survey of Cloud Computing Security challenges and solutions. Data security assignment International Journal of Computer Science and Information Security, 14(1), 52.
Subject Name: Information Technology
If you want the solution to this assignment or want to discuss any other assignment or course you may contact us directly at firstname.lastname@example.org or message us on Whatsapp or Viber at +91-9303607402 (http://api.whatsapp.com/send?phone=919303607402&text=Hello%20 )