Description
Research Paper which must include common vulnerabilities and methods that can be used to prevent them. Attaching a Project Evaluation Rubric unber which this paper will be evaluvated.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
SECURITY DATA BREACH
1
Security Data Breaches
Institutional Affiliation
Date
SECURITY DATA BREACH
2
Table of Contents
SECURITY DATA BREACH ............................................................................................................................... 3
INTRODUCTION ............................................................................................................................................. 3
CONSEQUENCES OF DATA BREACH IN A BUSINESS ...................................................................................... 4
DATA BREACH RULES AND REGULATIONS .................................................................................................... 5
COMMON VULNERABILITIES AND PREVENTIVE MEASURES TOWARDS SECURITY DATA BREACH .............. 6
TYPES OF DATA BREACHES AND ALTERNATIVE SOLUTIONS ......................................................................... 9
Malware .................................................................................................................................................... 9
Phishing ..................................................................................................................................................... 9
Password attacks .................................................................................................................................... 10
Ransomware ........................................................................................................................................... 11
Denial of service ...................................................................................................................................... 11
CONCLUSION............................................................................................................................................... 12
REFERENCES ................................................................................................................................................ 14
SECURITY DATA BREACH
3
SECURITY DATA BREACH
INTRODUCTION
Every business today can testify to the importance of integrating technology in business
processes. No matter the size of the business, integrating technology in business brings
efficiency, speed, accuracy, production quality among others (Wagner, (Eds.) 2017). This will
help produce customers’ demands and thus gives trade benefits; improved revenues and
alternative profits. However, integrating technology comes along with potential problems which
may be difficult to solve and causes a massive loss in the business. Therefore, businesses should
focus on investment and integrate necessary measures that may arise from the important role of
technology.
Businesses today are filled with computations in their daily activities and thus we can’t expect
everything to go normally. Some mistakes caused by an internal or external source occurs
leading to losses. Therefore, by definition, ‘security data breach is a confirmed incident that is
sensitive and confidential where protected data has been accessed or disclosed to an
unauthorized person either intentionally or unintentionally.’’ The common term associated with
the data breach is ‘hacking’ where for this reason hackers gain access to a device that has
encrypted information for whatever reasons.
Various data breaches occur including exposure of personal information such as credit card data,
health care insurance, and social security numbers, customer lists in businesses or even software
source codes. Data breached occurs when an unauthorized party accesses data that is protected
and maybe manipulates it. If data breach results to negative consequences such as theft of
important data for an individual and organization, violation of industry and business regulations
SECURITY DATA BREACH
4
and offending the image of an organization or brand, this is a security data breach and attracts
civil and criminal litigation (Edwards, Hofmeyr, & Forrest, 2016). Security data breach may also
include loss of physical data media such as data tapes, hard drives, laptops and computers which
contain protected data or posting information on the World Wide Web to which information
cannot be accessed without the internet network.
CONSEQUENCES OF DATA BREACH IN A BUSINESS
The average security data breach takes less to pull off than preparing a glass of tea, research
states that 80% of businesses do not realize when data breaches occur and most of them occur in
less than a minute (Ponemon, L. (2015). There are many cons...