Data Security Breaches

User Generated

WnfuhnWun

Writing

Description

Research Paper which must include common vulnerabilities and methods that can be used to prevent them. Attaching a Project Evaluation Rubric unber which this paper will be evaluvated.

Unformatted Attachment Preview

Project Evaluation Rubric Component Project overview Justification for hypotheses Supporting evidence Review of relevant research Maintains purpose/focus Methodology • Sample • Procedures • Measures • Data analytic plan Grammar, clarity, and organization References and citations Exemplary (3) Effectively and insightfully develops a set of testable, supportable and impactful study hypotheses. The introduction section provides a cogent overview of conceptual and theoretical issues related to the study hypotheses. Demonstrates outstanding critical thinking. Adequate (2) Develops a set of testable and supportable hypotheses. Inadequate (1) Hypotheses are not testable or justifiable. The introduction section provides a logical overview of conceptual and theoretical issues related to the study hypotheses. Demonstrates competent critical thinking. Very little support for the conceptual and theoretical relevant to the study hypotheses was provided. Provides little evidence of sound critical thinking. Provides clearly appropriate evidence to support position Sophisticated integration, synthesis, and critique of literature from related fields. Places work within larger context. Provides adequate evidence to support position Provides a meaningful summary of the literature. Shows understanding of relevant literature The project has an organizational structure and the focus is clear throughout. Identifies appropriate methodologies and research techniques but some details are missing or vague. Provides little or no evidence to support position Provides little or no relevant scholarship. The project is well organized and has a tight and cohesive focus that is integrated throughout the document Identifies appropriate methodologies and research techniques (e.g., justifies the sample, procedures, and measures). Data analytic plan is suitable to test study hypotheses. Provides appropriate justification for controls. Project is feasible The manuscript is well written and ideas are well developed and explained. Sentences and paragraphs are grammatically correct. Uses subheadings appropriately. Properly and explicitly cited. Reference list matches citations The manuscript effectively communicates ideas. The writing is grammatically correct, but some sections lack clarity. Properly cited. May have a few instances in which proper citations are missing. The document lacks focus or contains major drifts in focus The methodologies described are either not suited or poorly suited to test hypotheses. The methodology is under-developed and/or is not feasible. The manuscript is poorly written and confusing. Ideas are not communicated effectively. The manuscript lacks proper citations or includes no citations.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

SECURITY DATA BREACH

1

Security Data Breaches
Institutional Affiliation
Date

SECURITY DATA BREACH

2

Table of Contents
SECURITY DATA BREACH ............................................................................................................................... 3
INTRODUCTION ............................................................................................................................................. 3
CONSEQUENCES OF DATA BREACH IN A BUSINESS ...................................................................................... 4
DATA BREACH RULES AND REGULATIONS .................................................................................................... 5
COMMON VULNERABILITIES AND PREVENTIVE MEASURES TOWARDS SECURITY DATA BREACH .............. 6
TYPES OF DATA BREACHES AND ALTERNATIVE SOLUTIONS ......................................................................... 9
Malware .................................................................................................................................................... 9
Phishing ..................................................................................................................................................... 9
Password attacks .................................................................................................................................... 10
Ransomware ........................................................................................................................................... 11
Denial of service ...................................................................................................................................... 11
CONCLUSION............................................................................................................................................... 12
REFERENCES ................................................................................................................................................ 14

SECURITY DATA BREACH

3

SECURITY DATA BREACH
INTRODUCTION
Every business today can testify to the importance of integrating technology in business
processes. No matter the size of the business, integrating technology in business brings
efficiency, speed, accuracy, production quality among others (Wagner, (Eds.) 2017). This will
help produce customers’ demands and thus gives trade benefits; improved revenues and
alternative profits. However, integrating technology comes along with potential problems which
may be difficult to solve and causes a massive loss in the business. Therefore, businesses should
focus on investment and integrate necessary measures that may arise from the important role of
technology.
Businesses today are filled with computations in their daily activities and thus we can’t expect
everything to go normally. Some mistakes caused by an internal or external source occurs
leading to losses. Therefore, by definition, ‘security data breach is a confirmed incident that is
sensitive and confidential where protected data has been accessed or disclosed to an
unauthorized person either intentionally or unintentionally.’’ The common term associated with
the data breach is ‘hacking’ where for this reason hackers gain access to a device that has
encrypted information for whatever reasons.
Various data breaches occur including exposure of personal information such as credit card data,
health care insurance, and social security numbers, customer lists in businesses or even software
source codes. Data breached occurs when an unauthorized party accesses data that is protected
and maybe manipulates it. If data breach results to negative consequences such as theft of
important data for an individual and organization, violation of industry and business regulations

SECURITY DATA BREACH

4

and offending the image of an organization or brand, this is a security data breach and attracts
civil and criminal litigation (Edwards, Hofmeyr, & Forrest, 2016). Security data breach may also
include loss of physical data media such as data tapes, hard drives, laptops and computers which
contain protected data or posting information on the World Wide Web to which information
cannot be accessed without the internet network.

CONSEQUENCES OF DATA BREACH IN A BUSINESS
The average security data breach takes less to pull off than preparing a glass of tea, research
states that 80% of businesses do not realize when data breaches occur and most of them occur in
less than a minute (Ponemon, L. (2015). There are many cons...


Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags