Exploring the Steps Taken by an Organization in Managing Data Security and Confidentiality for Availability and Integrity in a Case Study of an AOS Data Center in Rwanda
Creators
Description
This article focuses on how to revolutionize ICT in Rwanda, this study examined how security, data, and confidentiality are managed. As a case study, it will look at the actions done by the AOS data centre in Rwanda. To accomplish this, the study will define the various management roles for security, data, and confidentiality; investigate the actions taken by an organization, and assess the quality of information output produced by secure storage of data while it is being analyzed. It is also crucial to adhere to these practices. The government institutions data and personal information but don’t establish a national data protection authority. The security of confidential data and information belonging to the institution is of utmost importance. To guard against unapproved access to or publication of this information, the Information Technology (IT) Data centre AOS in Rwanda was established. The data center has taken many steps to reduce the danger of unauthorized access in order to guarantee this. As a result, the data center is determined to put into place rules and procedures that secure the acceptance, collection, storage, and eventual destruction of this data. These requirements may be federal, state, or other, including institutional policies. The use of R programming for data analysis and the statistical data management system gives insight into the management and analysis of quantitative data. The open-source R programming language has several tools for managing and analyzing quantitative data. This was confirmed by experiments utilizing the hacking tools Nmap and IP scan, which were employed by hackers to search for open ports on computers and network devices. The results of python or R programming show that there is a rather significant and favorable association between the development of technology and the efficacy of R programming. Additionally, research revealed that putting technology into practice has a favorable and significant impact on managing data security on Nmap's effectiveness. The top four features of Web Application Firewall (WAF) solutions that have a positive impact on user satisfaction are "Security monitoring," "Traffic Controls," and "Performance and Reliability." An algorithm selects these factors based on the traits in this category that are most likely to predict consumer satisfaction.
Files
IJISRT22NOV238 (1).pdf
Files
(633.5 kB)
Name | Size | Download all |
---|---|---|
md5:f7ed9be6a872cd1425f1ee6b4cbfb2e8
|
633.5 kB | Preview Download |