Author's note: Identifying the source of high profile data breaches

Verified

Added on  2021/09/14

|6
|1477
|447
AI Summary
Loss SECURITY AWARENESS INFORMATION SECURITY AWARENESS INFORMATION SECURITY AWARENESS 5 5 INFORMATION SECURITY AWARENESS Name of student: Name of university: Author’s note: Answer of question 1: Several news of data breaches that are high profile, which influences the corporate files that are internal, sheds light on the severity of data breach, which impacts the personal information of employee. The employers should prepare for any kind of data loss, and the organisations must think about the planning
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INFORMATION SECURITY AWARENESS
INFORMATION SECURITY AWARENESS
Name of student:
Name of university:
Author’s note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION SECURITY AWARENESS
Answer of question 1:
Several news of data breaches that are high profile, which influences the corporate files that
are internal, sheds light on the severity of data breach, which impacts the personal
information of employee. The employers should prepare for any kind of data loss, and the
organisations must think about the planning for protecting business of the organisations and
the employees with the help of incorporation of the particular tactics in the response plan of
the data breach. The data breaches that are associated with the records of employees present a
specialised threat as the record of information that is maintained by the organisations are
considered to be sensitive (Vashisth et al.). If any employer of an organisation loses the data
of employees the impact on the employee can be considered as long term impact than the
impact of the loss of a credit card number that can lead to the fraudulent charges that can be
rectified with the issuer of card. The loss of usernames and the passwords by the employer
can lead to the overcome of the workarounds that are authentication based for accessing
several other information that is confidential. In addition to this, if the employee works for
any government department, then the loss of the information of the employee can allow any
unauthorised user in creating a duplicate ID for stealing the sensitive information of the
government, which includes trade secrets and the patents (Yeboah-Boateng and Ezer Osei).
The productivity that the organisation gains from the employees can be hampered due to the
loss of information by the employers. The files that are lost are very hard to retrieve, it can
take several days for recovering the data, and it can lead to the downtime of the staff and the
loss of significant amount of sales. The loss of information by the employers can lead to the
damage in the future of the employees and as the process of retrieval of the sensitive
information can take huge time and the retrieval of the complete data is not guaranteed
(Taylor et al.).
Document Page
2INFORMATION SECURITY AWARENESS
Answer of question 2:
The impact of the loss of data by an organisation can result in various severe consequences.
The data breaches in the companies are increasing at a significant rate. The major impacts of
the loss of data in an organisation are as follows:
Damage to the reputation: The business of an organisation is majorly based on the
reputation of the company. The situation of a data breach in an organisation can damage the
companies severely. Even though the hack or breach in the organisation effects the
organisations in several methods, the companies often claim that the impact is negative
(Bressler and Martin). Prior to the introduction of internet, the recovery process of the
organisations were easier and the damage to the reputation was considerably lower but with
the introduction of internet, the news of any data breach spreads rapidly and the impact is
higher.
Decrease in the competitive ability: It is considered that the majority of the hackers are
interested in the proprietary information of the businesses, that includes the strategies of
pricing and the trade secrets. If the cybercriminals obtain these information, the
competitiveness of the company can be severely affected as these information can be sold to
the rival companies and the leaking of these information to the common public can also
happen (Li et al.). In addition to this effect, the competitive ability of the company will
decrease as the customers are likely to shift some other business partners.
Loss of trust of customers: The clients of companies share the confidential information
often with the businesses, with the assumption that the companies consists of the proper
measures of security placed for protecting the data of the customers. In the event of any data
breach, the questioning will be done by the customers about the trust that has been placed by
them in the company. Moreover, the customers believes that the company protect the
Document Page
3INFORMATION SECURITY AWARENESS
sensitive data and properly handle a data breach. The trust of the clients and the customers on
the company can be severely damaged due to loss of data and it affects increasingly if the
company is unable to handle an attack on the data (Perlroth and Nicole). It is the
responsibility of the company of maintaining the allegiance of clients. As the loss of trust
generates from an event of data loss, it can significantly decrease due to the lack of follow-up
by the companies. Extensive contingency plan should be implemented in the companies and
this plan should be properly conveyed to the customers and clients. It is considered that the
high sharing of the business information with the clients can provide the companies
significant advantage. This practise diminishes the suspicion of information hiding with the
clients.
Loss of revenue: The most common method of mitigating the risks of the companies from
the situation of data breach is to shut down the business until the discovery of the reason of
the data breach is done and proper solution is implemented. The priority of discovery of the
source of the data breach in the company must be highest and in the situation of any kind of
particular flaw in the network that allowed the access of the confidential information by the
hackers, the source should be discovered quickly. The company can lose significant amount
of money due to the shutdown of business processes for the eradication of criminal activity
(Waldrop and Mitchell.). With the increased shutdown of the network of the businesses, loss
of profits by the companies increases. Additionally, the decrease in the customer trust can
also occur due to the shutdown of the business. The tendency of the customers to shift to
another business for the services and the products due to the situation of data breach in the
company, the effect on the company is severe. The companies should practise transparency
with the customers and the questions of the customers should be answered appropriately for
maintaining the loyalty of customers (Heembrock and Mike.).
Comments on the video
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4INFORMATION SECURITY AWARENESS
This video is about the Great Brain Robbery. This is the practise of stealing trade secrets of
the American companies by China and the intellectual properties of the American citizen.
China is targeting every sector of the American economy and it leads to the loss of jobs. John
Carnell, claims that this type of attack is a threat to the economy of the country. He also
claims that the China is trying to steal the resources and tactics for growth of the Chinese
companies. Thousands of companies have been affected due to this attack. This video
discusses about the effects of corporate espionage on the companies of America for obtaining
growth by stealing and theft.
Document Page
5INFORMATION SECURITY AWARENESS
References
Bressler, Martin S. "PROTECTING YOUR COMPANY'S INTELLECTUAL PROPERTY
ASSETS FROM CYBER-ESPIONAGE." Journal of Legal, Ethical & Regulatory Issues17.2
(2014): 67-79.
Heembrock, Mike. "The risks of wearable tech in the workplace." Risk Management 62.1
(2015): 10.
Li, Yibin, et al. "Privacy protection for preventing data over-collection in smart city." IEEE
Transactions on Computers 65.5 (2016): 1339-1350.
Perlroth, Nicole. "Hackers in China attacked The Times for last 4 months." NY Times, Jan 30
(2013).
Taylor, Robert W., Eric J. Fritsch, and John Liederbach. Digital crime and digital terrorism.
Prentice Hall Press, (2014): 34-45.
Vashisth, Akanksha, and Avinash Kumar. "Corporate espionage: The insider
threat." Business Information Review30.2 (2013): 83-90.
Waldrop, M. Mitchell. "How to hack the hackers: The human side of
cybercrime." Nature 533.7602 (2016).
Yeboah-Boateng, Ezer Osei. "Of Social Engineers & Corporate Espionage Agents: How
Prepared Are SMEs in Developing Economies?." Journal of Electronics and
Communications Engineering Research 1.3 (2013): 14-22.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]