Access over 20 million homework & study documents

Data Integrity Breaches Discussion

Content type
User Generated
Subject
Computer Science
Type
Discussion
Rating
Showing Page:
1/2
Data breaches, which means accessing the data or information without authorization. Due to
these data breaches customers experience a major loss which may take a very long time to
rebuild the empire. This is sometimes not possible to rebuild the company due to a great loss
of reputation and fame. Frequently we see the pop-ups on the television regarding the
massive and huge data breaches. But this is not a great surprise because as technology
increases the cyber-crimes also got increased. According to some survey and record it was
reported that, in 2016 most of the data breaches are related to individual financial information
such as their PINs, debit/credit card details. Most data breaches are concentrated on the
companies and reputed firms so that they gain lots of information. ( Lillian Ablon, Paul
Heaton, Diana Catherine Lavery, and Sasha Romanosky,2006)
The companies who fall as prey to the data breaches are the one who maintains outdated
software, weak PINs, unintentional downloads may result in huge loss. To be out of the threat
one should maintain highly secured passwords and PINs, and close monitoring of the bank
accounts, credit cards. Always use safe URL's, secure your phone. By using high-
performance security software users can save the data from a malware or the virus. Hacking
is the most used method used for data breaches and it is about 60% in 2016 and got increased
by 3.2% from then. Hacking also includes skimming, phishing and malware. In the case of
internet users who use social networks and financial accounts, the data such as login
credentials are stored in the cloud at one place. All such credentials are the major
concentration of hackers. ( Joseph Bonneau, 2012)
Several studies report that the hijackers mostly use the data which was stolen in the form of
leaked email address such as paste sites and some random forms. The email accounts are
mostly checked for financial information and hack their bank accounts. This strategy is
mostly performed by most of the hijackers in the case of leaked email accounts. In social

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/2

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Data breaches, which means accessing the data or information without authorization. Due to these data breaches customers experience a major loss which may take a very long time to rebuild the empire. This is sometimes not possible to rebuild the company due to a great loss of reputation and fame. Frequently we see the pop-ups on the television regarding the massive and huge data breaches. But this is not a great surprise because as technology increases the cyber-crimes also got increased. “According to some survey and record it was reported that, in 2016 most of the data breaches are related ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4