logo

Data Breaches and Identity Theft

   

Added on  2022-08-20

4 Pages701 Words18 Views
Running Head: DATA BREACHES AND IDENTITY THEFT
1
Data Breaches and Identity Theft
Name
Institution
Date
Data Breaches and Identity Theft_1
DATA BREACHES AND IDENTITY THEFT
2
Data Breaches and Identity Theft
Topic
Data breaches and identity theft are some of the malicious acts that take place in the
web area. The problems have recently been on the rise as a result of the increased
advancement of technology. Besides, hacking activities have also become very diverse hence
increase in cyber insecurity. In the past, I have been a victim of data breach and data identity.
In addition, I realized that so many people and organizations have been victims of the same.
Educational issue
Advancements in the technology have introduced security threats such as data
breaches, cyber-attacks and identity theft which have been topics of discussion since there are
headlines every day all over on these issues especially in the information technology sector
(Chou, 2017). These cases of identity theft and data breaching threaten the safe usage of data
among many on the internet, this has led to serious concerns in different firms.
Evidence of the Issue/ Literature Review
According to Aldossary & Allen (2016), there are always headlines on data breaches
in various organizations which put the organization operations, customers and partners at risk
always. There also have been a high rise for malware; malware can be termed as any harmful
or malicious software. This acts as a gateway by hackers to access information. Research is
carried out since due to the vulnerabilities, breaches and software bugs. (Romanosky, 2016)
claimed from his study that most of the software designers stocks lower a lot when their
software systems are exposed to vulnerabilities. He also came up with a solution that firms in
this sector should introduce incentives to lower their losses by increasing investments to offer
security to their systems. There also have been studies on the effects and the causes of data
breaches, cyber-attacks, and identity theft and how the different breach disclosure laws have
curbed them.
Data Breaches and Identity Theft_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IS Security and Risk Management Assignment PDF
|10
|3410
|84

CYBER SECURITY.
|9
|373
|51

Cyber Security Management
|14
|2652
|374

Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Computer Security within JL: Mitigation Techniques and Advantages of Artificial Intelligence
|11
|2506
|299

Cybersecurity: Protecting Home and Office from Cyberattacks
|12
|2626
|224