From keyboard to cloud-base network revamped data lifecycle cybersecurity

Amadi Chukwuemeka Augustine, Juliet Nnenna Odii, Stanley A Okolie
2021 Zenodo  
This paper review seeks to identify the need for a revamped data life cycle security in the era of pervasive threat from skill cyber criminals at this time of internet of things. The motivation is to fill the knowledge gap by presenting some of the ways of data leakages and the likely protection in the organization. The aim is to present a good practice that encourages data confidentiality, acceptable use policy, knowledge of personnel and physical security policy. The building blocks of
more » ... tion security infrastructure across the entire organization is implemented by Enterprise Security Architecture. Rather than focus on individual functional and non-functional components in an individual application, it focuses on a strategic design for a set of security services that can be leveraged by multiple applications, systems, or business processes.
doi:10.5281/zenodo.5559352 fatcat:b4y22buue5ckbn7lz5xpmtwlfu