This report will analyse the data security requirements of the ‘Safe Journey’. In addition to this, it will also provide the review of the existing data security provision in the organisation. A small discussion will be given on the appropriate security encryption of the company along with the cost associated with it.
The data security requirements constitute a wide range of processes and tools that help the company to protect themselves in cyber space (Hashizume, et.al, 2013). The requirements are given below:-
The existing data security of the ‘Safe Journey’ can be reviewed on several aspects, namely compliance and awareness, information governance, record retention, and security of personal data.
Compliance and awareness:This would judge the privacy awareness and legislation compliance. The organisation follow the guidelines given in the General Data Protection Regulation, Unsolicited Communication Regulations, Human Rights Act. There are security standards, service agreements, policies, and statutory obligation defined by the management.The company is also providing the training and running client awareness programmes.
Information governance:The Company follows a fair and lawful governance processing. The data is processed with fairness and lawful procedures. In addition to this, the organisation takes care of the adequate level of protection while transferring information from one system to another or one country to another.
Record retention:The information and personal data, such as passport number, date of birth, account details, etc., are stored as per the guidelines given in the GDPR. In addition to this, the company has a well-defined record retention and destruction policies. The storage systems are regularly monitored in order to analyze any data theft (Stuart&Marek, 2016).
Security of personal data: the company is strictly against the use of the USB or disks. It has hired a third-party to provide data security solutions and review logging. The company also conducts regular reviews and assessment of the security system.
In order to propose a security encryption type, many factors should be seen. The most important of them is the size of the key. Considering this point, RSA encryption is suggested for the company. It make use of the public-key cryptography in order to deliver data through an insecure network. This encryption has two key, namely public key and private key. The former can be accessed by anyone while the private key is always confidential. One needs both keys while encrypting and decrypting an information. The key size is large, thereby increasing its level of security. The size of the key may usually vary between 1024 bits and 2048 bits. This may result in the slower encryption and decryption of the information (Li, et.al, 2014).
The cost of RSA encryption depends on the several factors but the major part of it depends on the length of the keys that users want. Obviously, the larger key would need more time of the developers or what they say CPU hours. The cost and time complexity for the particular type of key lengths. The estimation is given below:-
In this report, a discussion on thedata security requirements of the ‘Safe Journey’ was done, wherein a review of the existing data security provision in the organisation was provided. A small discussion was done on the appropriate security encryption of the company along with the cost associated with it.
just share your requirements and get customized solutions on time
offer valid for limited time only*
someone in is bought