Authors :
Dr. Musoni Wilson; Mupenzi Damian
Volume/Issue :
Volume 7 - 2022, Issue 11 - November
Google Scholar :
https://bit.ly/3IIfn9N
Scribd :
https://bit.ly/3ONHd95
DOI :
https://doi.org/10.5281/zenodo.7374713
Abstract :
This article focuses on how to revolutionize
ICT in Rwanda, this study examined how security, data,
and confidentiality are managed. As a case study, it will
look at the actions done by the AOS data centre in
Rwanda. To accomplish this, the study will define the
various management roles for security, data, and
confidentiality; investigate the actions taken by an
organization, and assess the quality of information
output produced by secure storage of data while it is
being analyzed. It is also crucial to adhere to these
practices. The government institutions data and
personal information but don’t establish a national data
protection authority.
The security of confidential data and information
belonging to the institution is of utmost importance. To
guard against unapproved access to or publication of
this information, the Information Technology (IT) Data
centre AOS in Rwanda was established. The data center
has taken many steps to reduce the danger of
unauthorized access in order to guarantee this. As a
result, the data center is determined to put into place
rules and procedures that secure the acceptance,
collection, storage, and eventual destruction of this data.
These requirements may be federal, state, or other,
including institutional policies. The use of R
programming for data analysis and the statistical data
management system gives insight into the management
and analysis of quantitative data. The open-source R
programming language has several tools for managing
and analyzing quantitative data. This was confirmed by
experiments utilizing the hacking tools Nmap and IP
scan, which were employed by hackers to search for
open ports on computers and network devices. The
results of python or R programming show that there is a
rather significant and favorable association between the
development of technology and the efficacy of R
programming. Additionally, research revealed that
putting technology into practice has a favorable and
significant impact on managing data security on Nmap's
effectiveness. The top four features of Web Application
Firewall (WAF) solutions that have a positive impact on
user satisfaction are "Security monitoring," "Traffic
Controls," and "Performance and Reliability." An
algorithm selects these factors based on the traits in this
category that are most likely to predict consumer
satisfaction.
This article focuses on how to revolutionize
ICT in Rwanda, this study examined how security, data,
and confidentiality are managed. As a case study, it will
look at the actions done by the AOS data centre in
Rwanda. To accomplish this, the study will define the
various management roles for security, data, and
confidentiality; investigate the actions taken by an
organization, and assess the quality of information
output produced by secure storage of data while it is
being analyzed. It is also crucial to adhere to these
practices. The government institutions data and
personal information but don’t establish a national data
protection authority.
The security of confidential data and information
belonging to the institution is of utmost importance. To
guard against unapproved access to or publication of
this information, the Information Technology (IT) Data
centre AOS in Rwanda was established. The data center
has taken many steps to reduce the danger of
unauthorized access in order to guarantee this. As a
result, the data center is determined to put into place
rules and procedures that secure the acceptance,
collection, storage, and eventual destruction of this data.
These requirements may be federal, state, or other,
including institutional policies. The use of R
programming for data analysis and the statistical data
management system gives insight into the management
and analysis of quantitative data. The open-source R
programming language has several tools for managing
and analyzing quantitative data. This was confirmed by
experiments utilizing the hacking tools Nmap and IP
scan, which were employed by hackers to search for
open ports on computers and network devices. The
results of python or R programming show that there is a
rather significant and favorable association between the
development of technology and the efficacy of R
programming. Additionally, research revealed that
putting technology into practice has a favorable and
significant impact on managing data security on Nmap's
effectiveness. The top four features of Web Application
Firewall (WAF) solutions that have a positive impact on
user satisfaction are "Security monitoring," "Traffic
Controls," and "Performance and Reliability." An
algorithm selects these factors based on the traits in this
category that are most likely to predict consumer
satisfaction.