logo

Data Integrity Breaches

   

Added on  2023-05-31

4 Pages754 Words330 Views
Leadership Management
 | 
 | 
 | 
Running Head: DATA INTEGRITY BREACHES
DATA INTEGRITY BREACHES
Name of Student
Name of University
Author’s Note
Data Integrity Breaches_1

1DATA INTEGRITY BREACHES
Introduction
A data breach that is caused due to numerous hackers to tend to draw information
regarding an organization or its functions has various risks including leakage of sensitive data
about the organization and its employees (Sen & Borle, 2015). There are many ways to
overcome the obstacle and retrieve data but this process requires a huge amount of cost incurred
in it. The risks and the approximate costs involved in the compromised data integrity breaches
are mentioned in the discussion part.
Discussion
It has been extracted from the findings of various researches that the cost incurred in the
mitigation of cyber breaches is much more than $400bn per year. This financial figure includes
remediation as well as preventive activities (Rao & Selvamani, 2015). This says the fact that a
particular financial institution is more likely to be the target of any attack compared to any other
organization, this is found out when the risk or reward ratio of successful breaching of the
perimeter of a bank is considered. Financial institutions would always remain the focus of any
kind of threat which seeks for financial gain.
In many cases the hackers do not aim in gaining financial profit by attacking an institute
or any other organization they just aim in changing the data and decrease the integrity of the
data. Suppose in a healthcare institute, an unauthorized user gets access to the data and changes
the records of patients (Bai, Jiang & Flasher, 2017). This could be very risky for him because the
change in data can put his life at risk. Changes in medical history, diagnoses and the records of
medication can prove to be disastrous for the patients as well as the institute.
Data Integrity Breaches_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Risk Assessment : Importance
|6
|1427
|16

Ethical Concerns on Record Keeping
|4
|869
|297

Block-Chain for Medical Records
|5
|1085
|23

IOT In Healthcare | Assignment
|4
|835
|26

The Bronx-Lebanon Hospital Center Data Breakage
|10
|2377
|257

Data Breach in the America JobLink System
|9
|2635
|33