logo

Information Security Breach: Impact and Avoidance

   

Added on  2023-06-04

5 Pages996 Words430 Views
 | 
 | 
 | 
Running head: ANALYTICAL CASE STUDY
Analytical case study
Name of the Student:
Name of the University:
Author Note:
Information Security Breach: Impact and Avoidance_1

Database (data warehouse) - data analytics 1
Answer for Information security breach, its potential impact and its
avoidance:-
On 22nd January 2017, hackers had infiltrated the electronic key system of a luxury hotel
in Austria named Romantik Seehotel Jaegerwirt and had taken over and locked out the hotel’s
computer system. The guests were locked out in their rooms until the ransom as demanded by
hackers was paid by the hotel (Bilefsky, 2018). Thus, the above incident is a typical example of
information security breach, which is defined as an unauthorized access of information on
devices, servers and networks of a system that results to the data leakage of an organization. This
type of data leakage could compromise the data and harm the people as well as bring down the
reputation of the organization (Soomro, Shah & Ahmed, 2016). The above incident is alarming
for guests and for anybody who ever stays a hotel. This has resulted cyber security experts to
focus more on different in which physical connected internet devices could be hacked and
accessed. The above example of security breach on hotel is a distinct example of frequent and
malicious modern-day piracy and the breech has been a atypical example of ransomware attack.
The above type of security breach is an example of electronic security breach as here the
invader or intruder exploits and takes advantages of any limitations or weaknesses of the system
and gets into the system to gains access to the organizations’ sensitive data. It is notable that
these type of security breaches occurs when any intruder, outsider or employee knowingly or
unknowingly violates the data access policies and get past the organization’s security measures
(Hartono et al., 2014).
Information Security Breach: Impact and Avoidance_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents