Ask a question from expert

Ask now

Study on Causes for Data Breaches

7 Pages2026 Words231 Views
   

Added on  2020-05-08

Study on Causes for Data Breaches

   Added on 2020-05-08

BookmarkShareRelated Documents
Abstract The breach of data is the major loss of information which is considered as an incident for the sensitive, protected and the confidential data that has been viewed, stolen and used for the unauthorised users. The focus is on the trading secrets and the intellectual property which works with the organised crime or the national government. The data breach is the security incident with the protected or confidential data that is being copied, transmitted, viewed and stolen through the individual un-authorisation to do so.
Study on Causes for Data Breaches_1
IntroductionThe data breach is considered a phenomenon with the unintentional information disclosure or theleakage of the data and the spilling of the data. This also includes the theft or the loss of the digital media like the computer tapes containing the media where the information is unencrypted with the posting of information on WWW. The focus is also on handling the transfer of the information to the system which is accredited for the security at the approved level. The notion isabout the information transfer to the information system with the hostile agency set with the competing corporation which is also exposed to intensive decryption techniques (Ablon et al., 2016).. There is a need to focus on the status of legislations around the US and the other developed countries like England, Germany, France and Australia. Causes for data breachesAs per the analysis, it is important to understand the reasons of the data breaches which includes the miscellaneous errors, the misuse of the insider and the privilege threats, the physical thefts and loss. There are other data breaches mainly due to the denial of service, crime ware, web-app attacks, point of the sale intrusions and the payment card skimmers. The weak and the stolen credentials, the application vulnerabilities and the social engineering where the hackers can lead to the exploitation of the data (Green, 2017). It has been seen that the weak and the stolen credentials are the major issue for the vulnerability of the system. It not only affects the application setting or the network protocol but destroys the function setting as well. The back doors and the application vulnerabilities are mainly depending upon accounting where the issues are including the brute-force methods and the SQL injection methods. There are certain malicious or the criminal attacks which are mainly due to the finance, espionage and due to fun
Study on Causes for Data Breaches_2
as well. The breach of the data is a major cause of the human error and needs to be handled so that it can be prevented as soon as possible. There are failures to the applying of the system patches with the employees who tend to leave their laptops unlocked and they are easily stolen. Some of the system glitch are also a major issue which needs to be taken care of, with application failure, logical errors in the transfer of data and the inadvertent data dumps. The companies work over the indirect costs where the standards are set for handling the investment inthe security and then managing the cost of under control. The malicious and the intention, system glitches and the human error are found to be the well-planned breaches which are targeted and worked upon by the hackers. Here, the phishing, scams,hacking, fraud, cybercrime are some of the issues in the data systems which are implemented. The e-commerce trading operations undergo the simulation of the targeted attack response testing where there are issues related to the intentional tampering by the disgruntled employees. There are people who tend to share the passwords and the people make wrong use of the same. ISO 27001 is one of the best practice framework which has been set to define the information security management framework to handle the security breaches accurately.Steps the businesses could adopt that would minimize the impact of data breachesFor the proper handling of the data, there is a need to measure the inventory with the different types and the quantity of the files. This includes the proper handling of the data and safeguard the information which includes the updating of the procedures, educating and then training the employees. The control of the computer usage with the security of the computers will help in keeping the security of the software and maintaining it up-to-date. With this, there are different
Study on Causes for Data Breaches_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Critical Thinking Internet of Things
|2
|725
|35

IT Security Management: The Home Depot Data Breach
|14
|4702
|91

Equifax Data Breach of 2017: Overview, Causes, and Impact | Desklib
|13
|596
|118

Risk Management Process for Information Security at CommDev
|14
|4806
|131

IT Security: Equifax Data Breach, Quantum Key Distribution, and Firewall Types
|12
|2997
|59

Asset Security and Risk Management: A Case Study of CDU Systems
|9
|1441
|416