DSpace
 

KNUSTSpace >
Research Articles >
Institute of Distance Learning >

Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/7949

Title: Detecting Data Leakage In Cloud Computing Environment A Case Study Of A General Hospital Software
Authors: Ofori Karikari, Alex
Issue Date: 2-Nov-2015
Abstract: Generally sensitive data are leaked by users or data entry operators and identifying those operators is paramount and should be done at an early stage to forestall any catastrophe. In distributed network, data should by all means be handed over to data operators or trusted third parties. Computing systems have been infiltrated by persons to cause irreparable damages to institutions and organizations worldwide and employee factor in data leakages/breaches has been on the ascendancy, through intentional or non-intentional leakages/breaches. So on this premise the thesis seeks to use user accessibility system which will cure non-repudiation and Transaction log /Audit Trail monitoring system to see whether one or more agents can be detected to have leaked data. Analysis of the old hospital system design was conducted and the finding is that, the system do not have any Transaction log / Audit Trail system so anything entered or deleted from the system, for example, could not be tracked by the system administrator. So based on the analysis, a new system design has Transaction log / Audit Trail system in place so all activities either within or outside the hospital are monitored and has a date and Time Stamp. So in conclusion, the new system gives the administrator the chance to monitor all activities in the system.
Description: A Thesis Submitted To The Institute Of Distance Learning, Kwame Nkrumah University Of Science And Technology In Partial Fulfillment Of The Requirements For The Degree Of Master Of Philosophy/ Science In Information Technology Department Of Computer Science, 2015.
URI: http://hdl.handle.net/123456789/7949
Appears in Collections:Institute of Distance Learning

Files in This Item:

File Description SizeFormat
Research submission to Supervisor.pdf3.65 MBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback