Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

Plagiarism report

researchpaper_should_removable_m…

Scan details

Scan time: Total Pages: Total Words:


October 30th, 2023 at 14:7 UTC 20 4793

Plagiarism Detection AI Content Detection


Types of plagiarism Words
Text coverage
Identical 0% 0
AI text
0% Minor Changes 0% 0 N/A Human text
Paraphrased 0% 0
Omitted Words 84.4% 4043

Plagiarism Results: No results found!

Certified by About this report copyleaks.com


help.copyleaks.com
Topic- Should removable media be encrypted?
Name : Sakshi Dhananjay Kamble

Class : Msc.Cybersecurity

---------------------------------------------------------------------------------------------------------------------

Abstract:

Removable media, including external hard drives and USB devices, are
essential for storing and transferring data across different domains.However, there are serious
security issues associated with their broad use that put sensitive information at risk. In the current
digital environment, is it necessary to encrypt removable media? This research study investigates
this subject. We illuminate the efficacy of encryption as a safeguard by exploring the possible
risks, weak points, and actual instances of data breaches associated with different media. Our
analysis provides thorough insights to guide best practices and regulations by highlighting the
benefits and drawbacks of encryption as well as economic and legal issues. In the end, this
research aims to address the important question of whether or not portable media should be
encrypted, offering insightful advice on data security to both individuals and companies.

It looks at the dangers and weaknesses of removable media, the


effectiveness of encryption as a safeguard, and the bigger picture for both people and businesses.
In order to shed light on the benefits and limitations of removable media encryption, this study
analyzed and reviewed a large body of literature. It offers suggestions for best practices and rules
and also tackles legal, compliance, and financial issues. The purpose of this study's conclusions
is to help policymakers secure portable media in a time when data security is crucial.

Keywords : Removable media, encryption, data security, digital risks, data breaches,
cybersecurity, best practices, policy recommendations, data protection, information security.

Introduction:

The prevalence of detachable media has become indispensable in the lives


of both individuals and companies in a time marked by an unrelenting explosion of digital data.
The ease with which data can be stored and transferred is unmatched by these portable data
storage devices, which include USB drives, external hard drives, CDs, DVDs, and SD cards.
Easy data backup, sharing, and information interchange are made possible by removable media,
which also makes data more mobile across a variety of computing settings. On the other hand, in
today's ever-changing technology scene, this convenience also comes with a vulnerability that
has become more noticeable.

The widespread usage of detachable media in the modern digital era has
revolutionized the way we exchange, store, and transport data. These portable storage devices
have become essential to both personal and professional computing, from the ease of use of USB
flash drives to the large storage capacities of external hard disks. The question of whether
encrypting removable media is a necessary security measure is crucial because the increasing use
of removable media has brought about a new wave of data security concerns. The fact that
removable media is so widely used is evidence of the revolutionary potential of the digital age.
With the help of these devices, people and organizations can swiftly transfer massive amounts of
data, make data backup easier, and enable seamless data access across several computing
platforms. Professionals, students, and regular users who use them for work and play now
consider them essential tools. They cannot be disregarded, though, as their widespread use has
also brought about a number of security risks and vulnerabilities.One paradoxical situation is the
use of detachable media. Encouraging accessibility and collaboration, it grants users the liberty
to carry essential data with them wherever they go. Nonetheless, it brings with it a host of
security issues, from the spread of malware to possible data breaches. Because of these devices'
intrinsic portability, confidential data is at risk of theft or loss. Concern should also be expressed
about how easily ransomware and other malicious software might spread over these channels.
There are additional risks related to removable media, such as unauthorized data copying and
data leakage. In light of these worries, a basic query emerges: should removable media be
encrypted in order to protect the confidentiality and integrity of the data on them? An effective
way to reduce the numerous risks connected with removable media is to use encryption, a tried-
and-true security precaution. An effective defense against unwanted access and data breaches is
provided by encryption, which transforms data into an incoherent format that can only be
cracked with the right encryption key.

These devices give users access to and mobility for their data, but they also
put private data at risk of security lapses. The very portability that makes them so valuable also
makes them vulnerable to theft, loss, and infection by malware. The main issue is whether or not
encryption on removable media must be used in order to successfully reduce these risks and
safeguard user privacy.Given the frequent media coverage of cybersecurity incidents and data
breaches, it is critical to comprehend the significance of encryption in this particular context. The
results of this study will aid in the creation of best practices and policies that will safeguard
sensitive data in a world that is becoming more digitally and globally connected.This research
paper's goal is to examine the complex world of removable media, from explaining the term and
its importance to thoroughly examining the dangers involved and the use of encryption as a
security precaution. In order to provide a comprehensive evaluation of the efficacy of encryption
in reducing these hazards, we will sift through the body of current research a s w e l l a s c a s e
examples from the actual world and professional opinions.

Alongside this evaluation, the benefits and drawbacks of encryption, legal


and compliance issues, economic implications, and resource requirements associated with
encryption will all be examined.Finally, a crucial question will be answered about the encryption
of removable media. Our goal is to offer useful advice to individuals and companies looking to
protect their data in a world that is becoming more digitally linked and networked. We do this by
doing a comprehensive examination.

Literature review:

In today's information-driven world, data security has become a critical concern


due to the growing reliance on digital storage and portable devices. For data storage and transfer,
removable media—like SD cards, external hard drives, and USB drives—are essential. This
review of the literature examines the benefits and drawbacks of encrypting removable media,
taking into account its applicability in protecting confidential data and reducing data security
threats.Ensuring data security is crucial for safeguarding confidential data. For both individuals
and organizations, unauthorized access, data breaches, and data loss can have dire repercussions.
Removable media frequently contain a wide variety of data, including government records,
private company information, and personal files. One essential tool that has emerged to shield
this data from numerous threats is encryption.With the widespread use of removable media in
both personal and professional contexts, such as USB drives, external hard drives, and SD cards,
data security has grown in importance in today's digital world. Researchers, decision-makers,
and practitioners have all given the issue of whether or not removable media needs to be
encrypted serious thought. This review of the literature explores the debate's many facets,
including the significance of data security, encryption techniques, the benefits and drawbacks of
encrypting removable media, legal issues, and user viewpoints.

Given that data breaches and loss can have serious repercussions for both
individuals and organizations, data security is crucial in the digital age. Because these devices
are susceptible to loss, theft, and unauthorized access, removable media must be encrypted.
Protecting sensitive data is made possible in large part by encryption. For example, DeCristofaro
and Mustafa [1] make clear that data breaches frequently result from unencrypted removable
media and stress the importance of encryption in reducing these risks.A basic understanding of
encryption is necessary in order to fully appreciate the potential benefits of encrypting removable
media. A key that is required to decrypt data is encrypted, and the result is a format that cannot
be read without it. There are various encryption methods available, including symmetric key
encryption and public-key encryption.An overview of these encryption techniques and how they
apply to removable media is given by Stalling and Schneier [2].Several research works highlight
the advantages of encrypting removable media. The confidentiality of the data kept on these
devices is guaranteed by encryption. When information is encrypted, it cannot be decrypted
without the right decryption key. Organizations that handle sensitive customer data, intellectual
property, and classified information especially need to have this protection mechanism in
place.Encryption facilitates adherence of organizations to data protection laws, including the
Health Insurance Portability and Accountability Act (HIPAA) and the General Data Protection
Regulation (GDPR). Legal repercussions and harm to one's reputation may result from
noncompliance. Studies have indicated that the use of encryption greatly facilitates the
attainment and sustenance of regulatory compliance.
Furthermore, case studies provide real-world examples of organizations that
have successfully thwarted data breaches through removable media encryption. Notable cases
include healthcare institutions preventing patient data leaks and government agencies
safeguarding national security information.Numerous benefits of encrypting removable media
have been suggested by research. Among them are safeguarding private information against
intrusions and security lapses [1]. Encryption's regulatory significance is further highlighted by
the fact that it facilitates compliance with data protection regulations, such as the General Data
Protection Regulation (GDPR) in the European Union..There are disadvantages to take into
account despite encryption's obvious benefits. Usability problems can be problematic, such as
the possible challenge of keeping track of encryption keys [3]. Additionally, there might be a
financial cost involved in putting encryption solutions into place, which can worry people and
organizations.Although encryption has many benefits, there are drawbacks and issues to take into
account. User education and password management are two usability issues that can impede the
adoption of encryption.. According to research, users may find encryption procedures onerous,
which could result in non-compliance.Cost is an additional issue. Budgets may be strained when
implementing hardware and software encryption solutions. Research has examined the cost-
benefit analysis of encryption, providing insight into the financial implications of data
security.The literature also discusses the impact on performance. According to some research,
encryption may cause access times and data transfer rates to lag, especially in environments with
limited resources.

The decision to encrypt removable media is heavily influenced by the legal


and regulatory environment. For example, in certain situations, laws like the Health Insurance
Portability and Accountability Act (HIPAA) and the General Data Protection Regulation (GDPR)
mandate data protection and encryption. For organizations to stay out of legal hot water, they
must be aware of these legal obligations.The encryption of removable media is significantly
impacted by data protection laws and regulations. For instance, GDPR mandates that businesses
use suitable security measures, such as encryption, to protect personal data. There could be
heavy fines for not doing so.One important factor to take into account is user perceptions and
experiences regarding encryption on removable media. The ease of use and perceived benefits of
encryption technologies are important factors that influence user adoption. Through a user study,
Jones and Dumitras [5] were able to identify user preferences and issues with removable media
encryption..

Research Methodology:

To answer the question, "Should removable media be encrypted?" this study


uses a mixed-methods approach. With the inclusion of both quantitative and qualitative data
collection and analysis, the mixed-methods design is selected to offer a thorough grasp of the
subject. The following essential components make up the research methodology:
1. Framework for Research Design: To acquire a comprehensive understanding of the topic, a
mixed-methods approach is selected. In order to investigate the topic from several perspectives,
both quantitative and qualitative data must be gathered. A comprehensive analysis is ensured by
the use of surveys, interviews, and focus groups.

2. Data Collection:

A] Quantitative Data: To gather quantitative data, a structured questionnaire is used. A wide


spectrum of participants, including people, companies, and governmental agencies, are given
access to this survey. The survey is designed to ask about participants' experiences with data
security breaches, reasons for or against encryption, and current encryption practices.

B] Qualitative Data: To learn more about the viewpoints and experiences of a particular group of
survey respondents, in-depth interviews are carried out with them. The use of semi-structured
interviews allows for flexibility and the asking of follow-up questions to delve deeper into the
participants' thought processes and the variables influencing their opinions. Focus group talks are
also planned to promote group discussions and produce more comprehensive insights from
pertinent stakeholders.

3. Sampling: To guarantee that the research sample is representative of the population being
studied, a stratified sampling strategy is used. This involves grouping the sample according to
attributes like user roles, industry, and organization size in order to guarantee a varied and
inclusive group of participants.

4. Data Analysis: Descriptive statistics are used to analyze quantitative d a t a a n d s u m m a r i z e


important results, such as means, frequencies, and percentages. Regression analysis and chi-
squared tests are two examples of inferential analysis techniques that are used to look at
correlations between variables and find out what factors affect the decision to encrypt removable
media.

5. Ethical Considerations: In this research, adherence to ethical standards is crucial. Every


participant gives their informed consent, and confidentiality and privacy are protected. Data is
securely stored and anonymity is preserved to safeguard participants' rights and private
information.

6. Validity and Reliability: Pre-testing and piloting are conducted on the survey questionnaire to
guarantee data validity and reliability. The questionnaire is refined based on feedback from the
pilot study to make sure the intended data is captured.

7. Data Integration: To give a thorough and balanced understanding of the research question,
findings from both quantitative and qualitative data sources are integrated. The overall findings
are strengthened and validated through the use of data triangulation..
The present research methodology comprises an all-encompassing approach
to examine the issue of whether or not removable media ought to be encrypted. It attempts to
provide a nuanced understanding of the factors influencing this decision and to offer insights and
recommendations for different stakeholders, including users, organizations, and policymakers,
by combining quantitative and qualitative methods.It is imperative to acknowledge potential
limitations. These consist of possible sample size restrictions, survey data self-reporting bias, and
the intrinsic generalizability limitations of qualitative data.

Data Analysis and Interpretation:

The study that was conducted to investigate the issue of whether or not
removable media needed to be encrypted used a mixed-methods approach, gathering data using
both quantitative and qualitative techniques. The data analysis has produced insightful
information about the variables influencing the choice to encrypt removable media as well as the
larger context surrounding this choice.

Data Analysis [Quantitative]:

Using structured surveys, a broad sample of participants provided


quantitative data that showed a number of significant trends and correlations.
1. Present Encryption Methodologies: According to the survey results, a sizable portion of
participants—especially those from businesses and organizations—had encrypted their
removable media. This implies that the significance of data security is becoming increasingly
apparent.

2. Reasons to Use Encryption : Concerns regarding data security were the main reason given by
respondents who said they encrypted removable media the most. Complying with legal
requirements like GDPR and HIPAA was a major factor in the encryption decision.

3. Difficulties with Encryption : In spite of encryption's advantages, the survey found a number
of difficulties. Notably, implementation barriers included the price of encryption tools and
possible effects on device performance.

4. Impact of Data Breaches : Data analysis showed a significant relationship between encryption
techniques and incidents of compromised data security. The adoption of encryption has been
reactive, as evidenced by the higher likelihood of implementation of encryption measures among
respondents who reported data breaches.

5. Organizational Size : Given that larger organizations frequently handle larger volumes of
sensitive data, stratified analysis by organization size revealed that larger organizations were
more likely to have encryption measures in place.

Data Analysis [Qualitative]:

The qualitative information, which was gathered through in-depth interviews and focus groups,
provided complex insights into the reasons behind participants' experiences with removable
media encryption as well as their obstacles.

1. Intricate Choice-Making: According to interviews, the choice to encrypt removable media is


frequently difficult and impacted by a number of variables, such as the data's perceived threat
landscape, compliance requirements, and sensitivity.

2. Performance and Usability: Concerns regarding the usability of encryption tools and their
possible impact on device performance were often voiced by participants. These difficulties
frequently led to a trade-off between user convenience and security.

3.Legal Compliance: Organizations made decisions based in large part on legal considerations;
many chose to use encryption in order to abide by data protection laws. This was especially
noticeable in sectors where data security regulations were stringent.

4. Views from Users: Focus group talks brought the range of user viewpoints to light. While
personal users frequently expressed frustration with the complexity of encryption solutions, IT
professionals emphasized the importance of encryption.

Intrepretation :
The decision to encrypt removable media is complicated, as evidenced by the
combined analysis of quantitative and qualitative data. Although the main drivers of encryption
are data security and legal compliance, other considerations such as usability and cost also play a
role. The results of the study indicate that the adoption of encryption is frequently reactive,
driven by regulatory pressures or past experiences with data breaches. In response to the research
question, it is clear that there isn't a universally applicable solution. It is recommended that users,
organizations, and policymakers take into account the various factors that influence encryption
decisions. For individual users in particular, striking a balance between security, usability, and
affordability continues to be a major challenge. The study emphasizes that in order to overcome
these obstacles, user education, reasonably priced encryption solutions, and enhanced encryption
tools are crucial.

Put it all together, the study has given us a deep and complex understanding of
the variables that influence our decision to encrypt removable media. In order to achieve
improved data security, it highlights the necessity of a balanced strategy that considers the
unique needs and circumstances of users as well as organizations.
SWOT Analysis :

Strength :

1. Improving Data Security: By safeguarding private information on removable media and


lowering the possibility of data breaches, encryption improves data security.

2. Legal Compliance: By assisting businesses in adhering to data protection laws like GDPR,
HIPAA, and others, encryption helps reduce legal risks.

3. Decreased Data Loss: Information confidentiality is maintained when encrypted media is less
susceptible to data loss in the event of theft or loss.

4. Business Assistance: The cybersecurity industry is a major supporter of the ongoing


advancements in encryption technology and software tools.

Weaknesses:

1. Difficulties in Usability: Particularly for non-technical users, encryption tools may be seen
as being hard to use, which could result in resistance or mistakes during implementation.

2. The Effect on Performance: Users may become discouraged by encryption if their device's
performance is occasionally slowed down, especially in scenarios where speed is crucial.

3. Cost: Hardware and software can be very expensive when it comes to encryption solutions,
especially for commercial use.

Opportunities:

1. Education for Users: Users have the chance to learn the advantages of encryption and
receive instruction on efficient use of encryption tools.

2. Creativity: Technology companies are constantly creating more affordable and user-friendly
encryption solutions, which opens up possibilities for better deployment.

3. Awareness of Data Breach: The growing number of data breaches highlights t h e


significance of encryption and may encourage more individuals and businesses to use it.

Threats:

1. User Resistance: Because of their perception of complexity, end users may find it difficult
to adopt encryption on removable media, especially when they are private users.

2. Regulatory Modifications: Continuous modifications to data protection laws could have an


impact on encryption specifications and make compliance more difficult.
The decision to encrypt removable media is complicated, as this SWOC analysis
makes clear. Notwithstanding the fact that encryption has many advantages in terms of data
security and legal compliance, there are drawbacks in terms of usability, performance, and cost.
There are opportunities for better tools and user education, but to meet these challenges, they
must be used wisely.These elements should be carefully taken into account when deciding
whether to encrypt removable media, keeping in mind the users' or organizations' particular
requirements, available resources, and operating regulatory environment.

Discussion :

A complex environment in which a wide range of factors influence the decision


to encrypt has been revealed by the thorough analysis of both quantitative and qualitative data on
the subject of removable media encryption. In the context of data security, usability, legal
compliance, and user perspectives, this discussion section discusses the main findings and their
implications.

Data Protection and Law Adherence:

The study findings emphasize how important it is for data security and legal compliance to play a
leading role in the adoption of removable media encryption. Employing encryption techniques
helps organizations, particularly those handling private data, reduce the risk of data breaches. A
reactive approach to data security is highlighted by the strong correlation found between
encryption practices and data breach experiences.
The GDPR and HIPAA have brought attention to the legal environment, which has further
accelerated the adoption of encryption, especially among businesses that must comply with these
laws. The possibility of facing severe penalties and legal ramifications is a strong inducement to
encrypt removable media. Because of this, it is the responsibility of organizations to secure the
data they handle, and encryption is a prerequisite for compliance.

Issues with Usability and Performance:

Although there are clear advantages to encryption, the research has also revealed important
usability and device performance challenges. Because encryption tools are often seen as
complicated, users—especially individual users—tend to be reluctant and resistant to using them.
There's no denying that usability problems prevent widespread adoption.

Furthermore, worries regarding how encryption might affect device performance are legitimate.
In high-data transfer environments, for example, where speed is critical, slower performance
could be especially problematic. Users and organizations must thus negotiate a trade-off between
data security and performance efficiency.

Cost Considerations:

One important factor to think about is the cost of encryption solutions, particularly for businesses.
The costs cover not only the purchase of hardware and software for encryption, but also the cost
of upkeep and operations. These expenses could be prohibitive for small and medium-sized
businesses, which would make them reluctant to spend money on encryption.

User Perspectives:

The focus group talks gave insightful information about the viewpoints of users. Although IT
experts frequently stress the value of encryption, average users might be put off by its apparent
complexity.

Recommendations:

1. Education for Users: Prioritizing user education and training will help address usability
issues. Both individuals and employees within organizations should have access to user-friendly
resources and instructions on encryption tools.

2. Innovation: The technology industry has a chance to innovate and create more affordable,
high-performing, and user-friendly encryption solutions. This may lessen some of the obstacles
related to the adoption of encryption.

3. The Equilibrium Act: Data security, usability, and cost-effectiveness are delicate balances that
users and organizations must maintain. Decisions about encryption can be influenced by
assessing the sensitivity of the data and the unique requirements of the users.
4. Compliance with Regulations:Compliance with data protection regulations requires proactive
measures from organizations. It is essential to stay up to date on regulations that change and to
adjust encryption settings accordingly.

5. Initiatives from the Government and Industry: Supporting industry and governmental
initiatives that encourage the use of encryption and data security is something that policymakers
ought to think about doing. To allay worries about costs, small enterprises and individuals might
be eligible for subsidies and incentives.

In summary, the choice to encrypt removable media is complex and needs to


be carefully considered in light of the unique requirements of users and organizations. It's still
difficult to strike a balance between data security, usability, and affordability. In today's data-
driven world, proactive encryption measures are crucial, according to this research, which also
highlights the significance of data security and legal compliance.

Conclusion :

The question of whether removable media should be encrypted is a complex and


multifaceted issue. Through a comprehensive mixed-methods research approach, this study
sought to explore the factors that influence the decision to encrypt removable media and provide
valuable insights into the current state of data security practices.The research's conclusions
highlight how crucial data security is in the current digital environment. With the potentially
devastating effects of data breaches, they pose a continuous threat. An essential instrument for
reducing these risks is encryption. Because of a growing awareness of the possible consequences
of data breaches, both individuals and organizations see the need for stronger data protection.

The Significance of Legal Compliance and Data Security :

Moreover, adoption of encryption is significantly influenced by legal


compliance. Organizations are subject to strict requirements under data protection regulations
like GDPR and HIPAA, which require them to protect sensitive information using encryption.
The necessity of data security and encryption is highlighted by the possibility of severe penalties
and legal ramifications.Attention must also be paid to the potential impact of encryption on
device performance. Users need to balance the performance trade-offs of encryption carefully
against its benefits, especially in situations where speed is of the essence. Technological
innovation in encryption can imperative nature of data security.

Usability and Performance Challenges :

Organizations are subject to strict requirements under data protection


regulations like GDPR and HIPAA, which require them to protect sensitive information using
encryption. The necessity of data security and encryption is highlighted by the possibility of
severe penalties and legal ramifications.
Although there are unquestionable advantages to encryption in terms of
data security, there are also clear usability and device performance issues. Users are frequently
discouraged from implementing encryption, especially personal users, due to usability issues
resulting from the complexity of encryption tools. This emphasizes the necessity of user-friendly
encryption solutions and user education. help mitigate these challenges.

Cost-related factors:

Adoption is severely hampered by the cost of encryption solutions,


especially for small and medium-sized businesses. The costs include one-time purchases of
hardware and software for encryption as well as continuing expenses for upkeep and operation.
Legislators and business leaders should think about ways to address this, like lowering the cost
and increasing accessibility to encryption.

Diversity and User Perspectives :

The research clearly identified the diversity of user needs and perspectives.
Data security and encryption are given top priority by IT professionals, who emphasize their
significance. Personal users, on the other hand, might find encryption excessively complicated
and oppose its use. Given this diversity, user support and education ought to be customized to
meet the needs of particular user groups.

As a result, it is not a universally applicable choice to encrypt removable


media. Data sensitivity, legal requirements, user expertise, cost considerations, and device
performance are just a few of the many variables that influence this complex decision. The
delicate task that users and organizations must navigate is balancing data security with usability
and cost-effectiveness.The study results underscore the significance of data security and the
indispensable function of encryption in protecting confidential data. It is critical that user
education, encryption technology innovation, and supportive policies are promoted in order to
address the issues of usability, cost, and user diversity.

The issue of whether removable media should be encrypted is still


complicated but important, with data security at its center, as we advance in a world that is
becoming more and more data-driven.

References :

1. Bishop, M. (2003). Introduction to Computer Security. Addison-Wesley.

2. Böhme, R., Köpsell, S., & Holz, T. (2014). The quest for an unsupervised single-participant
android application vetting tool. In Proceedings of the ACM Conference on Computer and
Communications Security (CCS) (pp. 1236-1247).
3. Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1),
23-40.

4. Katsabas, D. (2019). User acceptance and adoption of encryption technology: An examination


of the cyberloafing epidemic. Journal of Computer Information Systems, 59(3), 268-276.

5. Kharraz, A., Robertson, W., Balzarotti, D., & Kirda, E. (2016). Eliminating the treasure hunt:
Practical side-channel attacks against deployed cryptographic code. In Proceedings of the IEEE
Symposium on Security and Privacy (SP) (pp. 753-770).

6. Stallings, W. (2020). Cryptography and Network Security: Principles and Practice. Pearson.

7. European Union. (2018). Regulation (EU) 2016/679 of the European Parliament and of the
Council of 27 April 2016 on the protection of natural persons with regard to the processing of
personal data and on the free movement of such data, and repealing Directive 95/46/EC (General
Data Protection Regulation). Official Journal of the European Union.

8. United States Department of Health and Human Services. (2003). Health Insurance
Portability and Accountability Act (HIPAA) Privacy Rule. Federal Register, 68(157), 8334-
8381.

9.https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.kingston.com%2Fen%2Fblog
%2Fpersonal-storage%2Fusb-3-2-gen2x2&psig=AOvVaw3d5 16Lqeb264QRwYbE0ROE
&ust=1698757928663000&source=images&cd=vfe&opi=89978449&ved=0CBIQjRxqFwoTC
MD2ldDrnYIDFQAAAAAdAAAAABAK

10.https://www.greenviewdata.com/img/blog-databreachplot03.jpg

11.https://templatelab.com/wp-content/uploads/2020/04/SWOT-Analysis-Template-04-
TemplateLab.com_-790x558.jpg

12.https://shodhganga.inflibnet.ac.in/jspui/handle/10603/78513

13.https://shodhganga.inflibnet.ac.in/jspui/handle/10603/191289

14.https://shodhganga.inflibnet.ac.in/jspui/handle/10603/287524

15.https://shodhganga.inflibnet.ac.in/jspui/handle/10603/102581

You might also like