Criterion B- IT background of the issue
Data recording has been a part of regular human life since the early 1500s. Early scientists and workers usually recorded their findings, earnings and other valuable information in a book for future reference and safe keeping. As the years went by, it became necessary to invent a method that by which large amounts of data could be stored in a specific place, safely and securely. This became possible with the invention of the computer and the internet. Databases are now used to store almost everything now. The information they store now range from identification of individuals to information about books. Many companies and organizations use databases as a means of storage of their delicate information.
In recent years, there has been an outburst in the rate of increase of security issues. Most of these usually involved hacking in some way. At this incredulous rate, everything that can be hacked is getting hacked. It is therefore necessary to protect the information that is stored from theft.
Criterion C- Impact of the issue
Employees and Organizations like Facebook, Twitter and Perfspot are important stakeholders in areas concerning databases. People store valuable and personal information on these websites. If these massive databases are invaded or hacked, then the individual’s identity is in danger.
One of the issues with this new method of passport I.D is that it gives hackers more to work for. It gives them more things to hack. Creating a database for passports where literally millions If not billions of individuals personal information are just lying around. There has to be adequate security, enough to protect the site from being hacked. “The shadow home secretary told a Tory fringe meeting there was no need for an identity card scheme storing 49 pieces of information about every citizen. Ministers say ID cards will provide an easy way of safely proving identity and will help combat identity fraud, crime and terrorism “.(BBC). There will also be less information on the I.D cards as said above than usual. This would limit the amount of information that a hacker could extract.
Criterion D
To stop hacking from occurring, organizations could set up a security system for their databases. The systems should work like firewalls. They should prevent un-identified users from accessing the database. They should also be able to keep data of people who log into the system, why they logged into the system and also what time they logged on. This would help to keep tabs on every going on in the database incase there is a problem or an attempt by someone to hack the system. This would enable the company or organization to know what time the person tried it and use this to filter out people who logged in at that time.