logo

It Security Article 2022

   

Added on  2022-10-11

8 Pages2194 Words17 Views
IT Security
Article: L., Cheng, F. Liu and, D.D., Yao, “Enterprise data breach: causes, challenges,
prevention, and future directions
0
NAME: STUDENT ID:

Table of Contents
Introduction.................................................................................................................... 2
The intention of the paper.................................................................................................. 2
Research methods used by the researchers..............................................................................3
Research approach........................................................................................................ 3
Research philosophy...................................................................................................... 3
Research design........................................................................................................... 4
Data gathering methods.................................................................................................. 4
Data analysis............................................................................................................... 4
Findings and results.......................................................................................................... 4
Issues highlighted............................................................................................................ 5
Conclusion of the article.................................................................................................... 5
Conclusion..................................................................................................................... 5
References..................................................................................................................... 6
1
NAME: STUDENT ID:

Introduction
A data breach is a serious problem for companies due to which the users can lose their personal
data or information. In this generation, the uses of computing devices and networks are raising
quickly that also lead to security threats and data leakage problems. It is identified that the
damage of individual info may lead to important reputational injury and financial issues in the
companies [1]. This report mainly focuses on data breach and challenges faced by the enterprise
systems and evaluate prevention techniques for resolving data breach problems. It is true that the
use of third parties with the enterprise systems produce hacking related problems and help the
attackers for accessing personal data of the users. This study will review a journal paper based on
the topic and include numerous points including the content, the results, research methods and so
on.
The intention of an article
The name of the adopted paper is Enterprise data breach: causes, challenges, prevention, and
future direction that were provided by cheng and other researchers 2017 [1]. According to the
researchers, a data leakage is the intention of contact of intimate facts to unauthorized parties
without talking permission of the consumers. In this modern generation, data has become a
critical component of the enterprise systems and hackers use effective tools for accessing the
personal information of the companies. This research paper may help the readers for finding the
risk factors that improve such kinds of problems in the companies and understand the effective
methods for solving data breach problems effectively [2].
The researchers identified that data leak may be produced by both interior and outside info
breaks but the major point is that users involve third-party servers that produce security threats in
the systems. From the recent study, it is found that interior consumers account for 43% of data
leak which is very high rather than external users and the major point is that the employee uses
unauthentic networks for accessing their accounts that produce problems in the systems [3]. The
major purpose of the hackers is to collect the personal data of the consumers and earn money
from the companies. The conducted literature helped the authors for identifying the risk factors
2
NAME: STUDENT ID:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malware Attack and Malware Analysis: A Research
|9
|2293
|146

5 Active Mobile Threats Spoofing Enterprise Apps: Applying Ethical Theory
|7
|1311
|91

Facebook and Mark Zuckerberg Recent Case Study
|6
|1131
|243

Aadhaar Data Breach: Threats, Vulnerabilities, Legal and Ethical Issues, Consequences, Lessons Learned and Recommendations
|11
|2720
|311

Cloud computing.
|7
|431
|44

Information Policy and Governance
|7
|1778
|71