Sign In
Not register? Register Now!
You are here: HomeResearch PaperIT & Computer Science
Pages:
6 pages/≈1650 words
Sources:
4 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 38.88
Topic:

Data Mapping (Research Paper Sample)

Instructions:
Find academic research on data mapping and data privacy, and explain how data mapping can help a organization understand their data protection posture, and how is can help with strategic, and tactical planning of the defense of critical data. From the research, develop a problem statement from what you read, or find a problem you can attempt to form a solution. Use APA format, and cite your sources. source..
Content:
Data Mapping Name University Course Number and Name Instructor Due Date Data Mapping Data privacy has emerged as a core concern in a world that is constantly embracing the adoption of different kinds of technology. This is because the adoption of technologies is often underpinned by the provision of sensitive and Personally Identifiable Information (PII) as a prerequisite. In this sense, the presence of PII in organizational computers and servers presents a key privacy concern for the individuals as well as the organization. There is a need to provide adequate security and privacy to data, seeing as this will guarantee user data protection. This problem is further compounded by differing regulatory requirements in different jurisdictions (Kounoudes & Kapitsaki, 2020). For instance, the General Data Protection Regulation (GDPR) covers individuals living in the European Union (EU), while the Health Insurance Portability and Accountability Act (HIPPA) covers American citizens (Shukla et al., 2022). Data compliance across these two jurisdictions will vary in such instances, and this presents challenges in the form of different requirements and standards guiding data protection and handling. This is a problem that needs to be solved and is one that rigorous data mapping techniques can help address comprehensively. Data Protection Posture The data protection posture of an organization presents a valuable outlook on its condition insofar as preventing data breaches, and hacks are concerned. In this sense, organizations need to clearly understand their posture, as this is integral to helping identify the potential weaknesses that an organization and its data are exposed to by design (Li et al., 2022). As mentioned above, regulatory compliance and verification is one of the critical aspects of understanding data protection posture. Since organizations can easily operate in varying jurisdictions, ensuring compliance verification is the first step in understanding data protection posture. Information typically flows from one system to another based on the setup of an organization, and at times, such systems can based in different jurisdictions and contain PII from individuals in different jurisdictions as well. In such a case, ensuring data protection becomes complex due to regulatory compliance obligations (Mulligan et al., 2016). Consequently, it becomes mandatory that organizations ensure regulatory alignment with differing practices such as HIPAA and GDPR. At the same time, it is also worth noting that audits play a core role in promoting regulatory alignment. Having a well-developed and elaborate data map is vital to facilitating smooth and efficient compliance audits (Kounoudes & Kapitsaki, 2020). On matters of posture, it is also necessary to remember the significance of risk assessments in facilitating the development of a clear organizational posture. All organizations are perennially exposed to varying cyber risks regardless of the protections they put in place. However, data mapping helps such organizations identify their vulnerabilities and the risks that said vulnerabilities expose them to (Kounoudes & Kapitsaki, 2020). Seeing as data is often in a state of flow from one system to another, a comprehensive data map helps the organization understand its security posture by highlighting its vulnerabilities, the level of exposure, and the potential impacts of leaks and data breaches on users and the general public. These factors contribute to formulating a comprehensive risk assessment, which is critical to a well-functioning and secure organization. Similarly, having a clear data map also helps an organization to better understand its security posture based on the data visibility it reveals. Insofar as data security is concerned, it is vital to understand where and what data is collected, where it is stored, and what the data is used for by an organization (Rawat et al., 2021). In this way, data mapping helps an organization to easily classify the data it handles according to its value, sensitivity, and regulatory requirements. Moreover, this helps organizations better understand the state of data visibility and, consequently, identify potential vulnerabilities that may need to be addressed. This, in addition to the aforementioned factors, contributes towards developing a robust and well-rounded understanding of organizational data protection posture, vulnerabilities, and potential fixes for said vulnerabilities (Shukla et al., 2022). From this, it becomes abundantly clear that data mapping is a core aspect of organizational security. Organizations that handle PII while operating in multiple countries under varying data protection regulations must embrace data mapping. Such organizations must equally develop adequate defenses against potential hacks and breaches that align with the regulatory frameworks within which they operate. A clear data map that outlines data flows, data systems, data storage locations, third-party vendors, and encryption requirements, to name a few, plays a central role in helping an organization boost its data protection posture (Mulligan et al., 2016). Consequently, it becomes naturally logical for such an organization to facilitate the development of a planned defense for critical data in the event of cyberattacks based on the data protection posture extracted from its data map. Planning the Defense of Critical Data In sports, it is often said that defense wins championships, not offense. This approach is equally applicable in the world of cybersecurity. Considering the advent of cybersecurity as a practice and the rampant increase of threat actors that are looking to obtain sensitive PII from organizations today, the need for strong organizational defense has never been more apparent. Organizations are constantly in possession of critical data. To prevent data breaches and hacks during unavoidable cyberattacks, organizations must develop strategic and tactical plans that address all vulnerabilities exposed by their data maps (Rawat et al., 2021). Strategic Planning Strategic planning focuses on the big picture of the organization's security posture. If an organization struggles to ensure effective data compliance while operating in multiple regulatory frameworks, a strategic plan is focused on ensuring organizational protection and robustness in the long term (Shukla et al., 2022). It provides a birds-eye view of what the organization needs to do to address its long-term vulnerabilities. One of the definitive measures in a strategic plan is the development of an incident response plan. When an organization operates in multiple regulatory frameworks, it employs varying data protection techniques. These often include different privacy laws and encryption standards, to name a few. It is important to note that threat actors often identify the gaps in such laws and standards and, in doing so, can formulate and plan an attack on the organization's data, whether in transit or in situ (Li et al., 2022). Developing an effective incidence response plan helps organizations to achieve two core benefits. First, they can preempt and reinforce possible attack vectors to prevent intrusion. Secondly, they can develop an adequate response plan that is compliant with all the regulatory frameworks in which the organization operates, which not only provides redundancy but also significantly reduces the chances of successful cyberattacks (Shukla et al., 2022). It is vital to note that strategic planning also underscores the organization's resource allocation. Once data mapping has identified the organization's critical assets and potential vulnerabilities, the organization can deploy resources to bolster the security of said assets (Mulligan et al., 2016). This is particularly important with regard to organizations operating across varying regulatory frameworks. Furthermore, developing a data protection strategy will facilitate informed decision-making at all organizational levels, which ensures synergy in the prevention of attacks and ensuring data compliance across varying regulatory frameworks. Once the potential vulnerabilities have been identified and addressed through the aforementioned strategic initiatives, the organization can also future-proof itself by strategically scaling data protection measures in anticipation of future risks and needs. All these factors play a critical role in developing and maintaining an effective strategic plan for organizations that need help observing compliance across multiple jurisdictions. Tactical Planning On the matter of tactical planning, organizations facing challenges of ensuring compliance while operating across multiple regulatory frameworks must first raise staff awareness and conduct employee training (Shukla et al., 2022). It is critical that the employees of the organization, particularly those directly involved in the data systems, understand the various data protection requirements demanded by law across the different frameworks (Rawat et al., 2021). Similarly, said employees must understand the data flows, have security awareness, and understand the data handling processes involved in the flow of data as established through the data map. This is highly critical because an informed workforce is arguably the most critical line of defense against potential cyberattacks and threat actors. Once the staff has been trained and is aware of the vulnerabilities they are exposed to, the organization must develop and implement the requisite security controls to tame the vulnerabilities exposed by the data map (Shukla et al., 2022). Security controls such as access controls, encryption, and monitoring play an important role in the protection of the organization. Data mapping is integral to this pr...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Types of Risks
    Description: Types of Risks IT & Computer Science Research Paper...
    5 pages/≈1375 words| 5 Sources | APA | IT & Computer Science | Research Paper |
  • E-government
    Description: E-government IT & Computer Science Research Paper...
    4 pages/≈1100 words| 7 Sources | APA | IT & Computer Science | Research Paper |
  • Information Technology: Cloud Computing Industry Analysis
    Description: Information Technology: Cloud Computing Industry Analysis IT & Computer Science Research Paper...
    10 pages/≈2750 words| 12 Sources | APA | IT & Computer Science | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!