With the advent of the digital revolution, concerns, organisations, and even governments are turning to computerised systems to demeanour their daily operations. As a result, data security has become a top precedence to protect data from various internet threats and any unauthorised access. As data breach, ransomware, and hack news becomes the norm, it follows that data security trends will also move in tandem with ongoing technological advancement. Due to the rapid reversion of technology, it is essential to find appropriate developing computer technologies. This paper\'s objective is to identify the most imperative technologies in India by emphasising emergent trends in data security and future trends in computing
Introduction
I. INTRODUCTION
In a progressively public digital world, privacy seems to be a recurring theme. As more association gather and use intimate information, concerns about the security and confidentiality of personal information increase. User information is obtained in various inaccessible. B. Through her cookies on her website that track user information or information that users voluntarily share. Customers can choose how much they acquiescence to the data they provide and its use, but privacy regulations are continually altering, reflecting growing concerns about innovative inaccessible of acquiring, storing, and using data. increase. Despite increasing regulatory efforts, data protection is an evolving field with threats and challenges. Companies have huddled a lot of information from the rapid growth of technology, although laws and other thermostat have until now to hook up. The risks associated with data processing can be significant for data subjects whose personal data are processed, so privacy and data protection issues must take precedence in any controversy of data. Protecting and respecting the dignity and right to privacy of all people is very important. It is a basic human right that applies to citizens of any country and to community with certain immigration statuses.
II. GARTNER HYPE CYCLE
The assault floor is the range of all viable factors or assault vectors thru which an unauthorized person can input the machine and extract statistics. The smaller the assault floor, the less complicated it's miles to defend. Gartner recommends protection leaders appearance past conventional progressions to protection monitoring, detection and reaction to manipulate a much wider set of risks. Misuse of credentials is now a number one technique that attackers use to get right of entry to structures and acquire their goals. Human blunders maintains to function in maximum statistics breaches, displaying that conventional processes to protection attention education are ineffective. Broadminded organizations are moving beyond outdated compliance-based awareness campaigns and investing in holistic behaviour and culture change programs designed to provoke more secure ways of working. Gartner strategic technology trends relate towards business to creates an enhanced customer experience by combining multiple software engineering strategies to protect against risk. Through observability, automation, and extreme design and testing, it delivers resilient systems that mitigate operational and security risks. Gartner makes use of the term “Wi-Fi cost realization” to explain the variety of approaches wherein next-era Wi-Fi technology will quickly supply new and advanced offerings and decrease capital costs. Sustainable era is an another framework of answers that will increase the electricity and performance of IT services; permits business enterprise sustainability via technology like traceability, analytics, emissions control software program and AI; and facilitates clients acquire their very own sustainability objectives. Platform engineering is a rising fashion meant to modernize organisation software program delivery, specifically for virtual transformation. The engineering platform is created and maintained via way of means of a committed product group, designed to assist the desires of software program builders and others via way of means of supplying common, reusable equipment and skills, and interfacing to complicated infrastructure. The precise skills of an engineering platform rely totally at the desires of its give up users.
The platform is a product, constructed via way of means of a committed group of professionals and supplied to customers, who can be builders, information scientists or give up users. Platform groups want to apprehend the desires in their person groups, prioritize the work, after which construct a platform this is beneficial to the goal audience.
Gartner trends to impact enterprise strategies in the coming three years by enabling organizations to address four key priorities: Optimizing resilience, operations or trust Scaling vertical solutions, product delivery or everywhere Pioneering customer engagement, accelerated responses or opportunity Pursuing sustainable technology solutions
This Gartner Hype Cycle covers a wide range of data security topics. This Hype Cycle covers a wide range of data security issues that organization should consider in light of risk tolerance and the locations of data storage, processing, and access.
Data Protection: precautions come in a variety of sizes and forms and shield data from an increasing number of threats. Though the majority of these risks come coming from external sources, companies should also emphasis on conserving their data from within. Data security techniques include: Data encryption: Data encryption applies a code to every individual piece of data and will not grant access to encrypted data deprived of an authorized key being given
Data Camouflaging: Data can indeed be shielded from disclosure to possibly hazardous external sources and internal individuals by masking particular portions of it. For illustration, a database may mask the first 12 digits of a credit card number. Data erasure: There are times when data that is no longer active or used needs to be erased from all systems. For example, if a customer has entreated for their name to be removed from a mailing list, the details should be deleted permanently.
Data Pliability: Organizations can recover data in the event that it is unintentionally deleted, corrupted, or stolen during a data breach by making backup copies of the data. Safeguarding the data that a company gathers, keeps, generates, receives, or sends is the main goal of data security. Compliance is another important factor. Whatever tool, technique, or method is utilised to manage, store, or gather data, it must be protected. Data breaches can lead to court cases, significant fines, and reputational harm for a business. Protecting data from security threats is more crucial than ever before.
III. EMERGING TECHNOLOGY IN DATA SECURITY
A. Hardware Authentication
One way is to build the authentication into the user's hardware. Intel is heading in that direction with its Authenticate solution for the new 6th Gen Core Pro processors. A variety of hardware-enhanced elements can be combined simultaneously to verify a user's girlfriend's identity. Authentication requires three things from the user: Something the user knows (such as a password). Who are they, etc. B. Usernames. What do they have, such as tokens. For authentication, the device will be the one you have.
B. Data Loss Prevention
A key to records loss prevention is technology along with encryption and tokenization. They can shield records right all the way down to subject and subfield level, that could gain an agency in some of ways. Cyber-attackers cannot monetize records with inside the occasion of a hit breach.
C. Security Convergence Powered By AI
One of the maximum not unfamiliar place and essential makes use of AI is in information security, that's one of the exciting crucial property of any tech-cantered organization.
With touchy information starting from organizational secrets and techniques to patron information (including credit score card information) saved online, safeguarding information is essential for assembly each the prison and operational responsibilities of a business.
D. IoT with 5G Network
With the arrival and boom of 5G networks, a brand new generation of inter-connectivity turns into a truth with the Internet of Things (IoT). 5G structure is relatively new with inside the enterprise and calls for quite a few studies to locate loopholes to make the device steady from outside assault. Every step of the 5G community may carry a plethora of community assault that we may not be conscious of. Here producers want to be very strict in constructing state-of-the-art 5G hardware and software program to govern information breaches.
E. Cloud Is Also Potentially Vulnerable
With a snowballing quantity of corporations now installed on clouds, security features want to be constantly monitored and up to date to protect the information from leaks. Although cloud correspondences inclusive of Google or Microsoft are agreeably organized with protection from their give up still, it`s the person give up that acts as an enormous supply for mistaken errors, malicious software, and phishing attacks.
Conclusion
Data security involves identifying, evaluating and reducing risks related to sensitive information. Developing risk-based data security processes is the key to keeping your data secure. By identifying and classifying your data, understanding and mitigating IT risks, and putting appropriate controls in place, you can strength both data security and compliance. New developments and ideas continue to shape the future of security technology, and security breach news is a constant reminder of how important the right technology is to success. However, identifying and implementing the latest security technology trends is only effective with a deeper understanding of what security technology is, and how it works. Security technology are concepts, policies, and components designed to minimize risk, identify vulnerabilities, and apprise how and when to retort to potential incidents. But good security goes beyond just installing a system. Technology development has more and more routine tasks/processes that need to be managed by information systems and require the use of the Internet. However, as technology evolves, so do existing threats and their associated risks, as well as the possible controls to implement and address them. Independent security audits covering various sectors can therefore help detect security breaches and support the implementation or improvement of security controls.
References
[1] Melville,N, Kramer,K, Gurbaxani,V. (2004) ‘Information Technology and Organizational Performance: An Integrative Model of IT Business Value’, Research Journal of Social Science & Management, pp. 01-78.
[2] Hayen, L. R. (2012) ‘Issues in Information System’, Volume 13, Issue 2, pp. 238-247, 2012.
[3] Bowman, M, (2010) ‘Emerging technology trends- finding the next big thing’: Journal of Information Communications Technology in Higher Education.
[4] National Conference on Emerging Trends in Information Technology & Management (NET-ITM-2011) (05 March, 2011).
[5] Buyya,R, Yeo,C.S, Venugopal, S, Broberg, J, Brandic, I, (2008) ‘Cloud computing and emerging IT platforms: Vision, hype and reality for delivering computing as the 5th utility’
[6] Tastle,J.W, Valfells, A ‘Emerging trends in information technology departments of major Icelandic corporations’.
[7] Fichman,G.R, (2004) ‘Going beyond the Dominant Paradigm for Information Technology Innovation Research: Emerging Concepts and Methods’: Journal of the Association for Information Systems Vol. 5 No.
[8] pp.314- 355/August 2004. 8. Avlonitis, G. J, Karayanni, D, A, (2000) ‘The impact of internet use on business-to-business marketing’: Industrial Marketing Management 29, 441–459 (2000).
[9] Kashorda, M, ‘Emerging Trends in information and communication technology education in Kenyan Universities’.
[10] Subedi, B. S (2004) ‘Emerging Trends of Research on Transfer of Learning’: International Education Journal Vol. 5, No 4, 2004.
[11] Roberto J. Mejias and Pierre A. Balthazard, \"A Model of Information Security Awareness for Assessing Information Security Risk for Emerging Technologies\", Journal of Information Privacy and Security, vol. 10, pp. 160-185, 2014.
[12] P. M. Vidhya, \"Cyber Security-Trends and Challenges\", International Journal of Computer Science and Mobile Computing, no. 2, pp. 586-590, 2014.
[13] A. Arabo and B. Pranggono, \"Mobile Malware and Smart Device Security: Trends Challenges and Solutions\", IEEE 2013 19th International Conference on Control Systems and Computer Science, pp. 526-531, 2013.
[14] H. Arora, G. K. Soni, R. K. Kushwaha and P. Prasoon, \"Digital Image Security Based on the Hybrid Model of Image Hiding and Encryption\", IEEE 2021 6th International Conference on Communication and Electronics Systems (ICCES), pp. 1153-1157, 2021.
[15] G. K. Soni, H. Arora and B. Jain, \"A Novel Image Encryption Technique Using Arnold Transform and Asymmetric RSA Algorithm\", Springer International Conference on Artificial Intelligence: Advances and Applications 2019 Algorithm for Intelligence System, pp. 83-90, 2020.
[16] A Sophos Article 04. 12v1.dNA, eight trends changing network security by James Lyne.
[17] https://www.gartner.com/en
[18] Sehrawat, Deepti & Gill, Nasib. (2019). EMERGING TRENDS AND FUTURE COMPUTING TECHNOLOGIES: A VISION FOR SMART ENVIRONMENT. 10.26483/ijarcs.v9i2.5838.