The Pros And Cons Of Data Security

1881 Words4 Pages

Introduction

Nowadays, people stores their data in computer rather than in physical objects like paper, this is to ensure their data are durable (usually against damage such as corrosion). These data can also be reproduced easily with a simple step and can be kept for long periods of time. Users can organize files in their own ways, where they themselves will know where their data are kept, thus allowing simplicity to ease of access to data. Given the generality of storing data in the computer, this thus increases the focus on data security.

It is a common fact that personal data are considered confidential. One of the most common methods to ensure proper data security, is to set up pins and passwords. This is very similar to having a key to a house, without a key, the owner could not enter his house. Therefore, the consequences of losing it can be as disastrous as having one's confidential information being exploited by an unknown person freely without the one's knowledge of it happening, for example, this may result in financial damage. One may also use these information for illegal usage, examples varies, from loaning money from loan sharks to even terrorist acts.

The most common method now to have passwords and pins are by auto-generation, widely known as a password generator, another less common method is by user-defined, where people will create the password or pin and remember it themselves.

More on Pins & Passwords
A personal identification number (PIN) is a numeric password shared between a user and a system that can be used to authenticate the user to the system.ISO 9564-1, the international standard for PIN management and security in retail banking, allows for PINs from four up to twelve digits, but also notes tha...

... middle of paper ...

...nsitive personal information. Thus, there is a need for secure pins and passwords, especially one that does not need too much of a hassle to have.

Furthermore, with the implementation of what we proposed above, the OPG (Online Password/Pin Generator) and OTP (One-Time Passwords), these are useful in many situations providing an ease of use for people, especially since both provides secured passwords and pins. We also find that with the assurance of OPG systems being battle-hardened, ensuring safety and reducing the hassle of generating and/or re-generating a password, together with OTP. These systems further enhances security, serving as part of access control to confidential and sensitive information.

Therefore, we conclude and strongly agree that the automatic generation of pins and passwords are to be widely implemented, most notably in Information Security.

Open Document