logo

Security Audit and Testing Article 2022

   

Added on  2022-08-29

6 Pages1454 Words12 Views
Running head: SECURITY AUDIT AND TESTING
SECURITY AUDIT AND TESTING
Name of the Student
Name of the University
Author Note

1SECURITY AUDIT AND TESTING
Discussions
1. A breach of data is the unintentional or intentional release or secure information to an
environment that is not trusted. The data breach is also known as the data leak, leakage of
information and data spill. The article deals with the data breach of Fortius chain of
hotels. There are various ethical, legal and social implications those are related to the data
breach of Fortius.
Legal implications
The data breach of the Fortius chain of hotels has harmful impacts of the customers of the
hotels as their personal details and credit cards number were stolen. There are several legal
implications behind the data breach of the hotels. When the data or the security is breached,
the company could be open to a lawsuit that is civil. This means that that the management or
the owner of the company should hire a lawyer and at the same time, other security measures
such as the communication with the customers that their data has been stolen. The company
should hire a lawyer in order to prevent litigation that is unwanted, but the lawyer must have
appropriate knowledge about the problems (Beaudin 2017). The company should contact
various professionals in order to affect a plan of controlling the harm from the data breach.
This can avoid a lawsuit with the customers those are angry as their data has been stolen and
the liability from the actions of the employees. There are data breach laws that says that the
companies should report data beaches within 30 days and if any company wilfully and
intentionally conceals a data breach then they will be penalised and the management of the
company can go jail.
Ethical implications
The organization should uphold the confidentiality and the integrity of the information of the
customers. It is very important for the Fortius Company because due to this data breach, the

2SECURITY AUDIT AND TESTING
hackers have stolen all the personal information and the credit card numbers. Here, the ethical
considerations come into play. The customers have trusted the company and provided them
with their personal information and the credit card numbers. The company should have some
ethics and protected their informations. The company should have thought that they have all
the information of the customers and they should properly safeguard the sensitive information
(Gupta 2018). However, they did not do so and the informations and the credit card numbers
were hacked. The company should have followed the CIA triad that is confidentiality,
integrity and the availability of the information. They should have properly protected the data
of their customers. The hackers do not have ethics, this is why they have hacked the database
of the Fortius Company and they have breached the data.
Social Implications
The social implications of the data breach of the Fortius Company are that the customers will
lose trust in the company and the reputation of the company will be damaged. Loss of
confidence and the views of the customers towards the company will leave a dark cloud on
the reputation of the company and it will create complications those are long term (Curtis et
al 2018). The breach had a damaging affect on the customers of the company. The passport
and the credit card numbers of the people were stolen and it had personal affects those were
disastrous. The hackers with the help of the credit card numbers and the passport numbers
can perform identity theft and can take out money from their bank accounts. This is one of
the most critical social implications of the data breach.
2. The tools that can be used by the company in order to recognise the network include
Paessler PRTG Network Monitor and Nmap. The company can use the Paessler PRTG
network monitor in order to recognise map the network of the Fortius Company (Mistry
et al 2016). This tool of network monitoring can help the Company to make sure that the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security in Banking System
|5
|1352
|96

Assignment On Computer Security Breach At Verizon
|6
|1996
|172

Data Security: A Review of Major Security Breaches Between 2014 and 2018
|14
|7570
|294

Data Breach Case Abstract
|3
|692
|334

SECURITY BREACH INCIDENT ON MARRIOTT INTERNATIONAL
|5
|791
|19

ZOMATO HACKED: Security Breach Results in 17 Million User Data Stolen
|5
|731
|290