Enterprise Data Breach: MITS5004 IT Security Research Report

Verified

Added on  2022/10/11

|8
|2194
|17
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
IT Security
Article: L., Cheng, F. Liu and, D.D., Yao, “Enterprise data breach: causes, challenges, prevention, and
future directions
0
NAME: STUDENT ID:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Introduction.................................................................................................................................................2
The intention of the paper............................................................................................................................2
Research methods used by the researchers..................................................................................................3
Research approach...................................................................................................................................3
Research philosophy................................................................................................................................3
Research design.......................................................................................................................................4
Data gathering methods...........................................................................................................................4
Data analysis...........................................................................................................................................4
Findings and results.....................................................................................................................................4
Issues highlighted........................................................................................................................................5
Conclusion of the article..............................................................................................................................5
Conclusion...................................................................................................................................................5
References...................................................................................................................................................6
1
NAME: STUDENT ID:
Document Page
Introduction
A data breach is a serious problem for companies due to which the users can lose their personal
data or information. In this generation, the uses of computing devices and networks are raising
quickly that also lead to security threats and data leakage problems. It is identified that the
damage of individual info may lead to important reputational injury and financial issues in the
companies [1]. This report mainly focuses on data breach and challenges faced by the enterprise
systems and evaluate prevention techniques for resolving data breach problems. It is true that the
use of third parties with the enterprise systems produce hacking related problems and help the
attackers for accessing personal data of the users. This study will review a journal paper based on
the topic and include numerous points including the content, the results, research methods and so
on.
The intention of an article
The name of the adopted paper is Enterprise data breach: causes, challenges, prevention, and
future direction that were provided by cheng and other researchers 2017 [1]. According to the
researchers, a data leakage is the intention of contact of intimate facts to unauthorized parties
without talking permission of the consumers. In this modern generation, data has become a
critical component of the enterprise systems and hackers use effective tools for accessing the
personal information of the companies. This research paper may help the readers for finding the
risk factors that improve such kinds of problems in the companies and understand the effective
methods for solving data breach problems effectively [2].
The researchers identified that data leak may be produced by both interior and outside info
breaks but the major point is that users involve third-party servers that produce security threats in
the systems. From the recent study, it is found that interior consumers account for 43% of data
leak which is very high rather than external users and the major point is that the employee uses
unauthentic networks for accessing their accounts that produce problems in the systems [3]. The
major purpose of the hackers is to collect the personal data of the consumers and earn money
from the companies. The conducted literature helped the authors for identifying the risk factors
2
NAME: STUDENT ID:
Document Page
linked with the enterprise systems and reduced the gaps from the research which lead the
research quality in the right direction [4].
It is argued that data leakage is mainly divided into two parts including intentional and
inadvertent threats which are highlighted in this paper. The researchers also proposed effective
strategies and methods for solving the malware and data leakage related issues from the systems
and reviewed the findings of previous articles based on the data breach and security threats [5].
For a better understanding of data breach, the researchers included graphs and charts and
evaluated the data leakage rate in the last 10 years. It is observed that unwanted signals and
malware occur in the enterprise systems may produce security related issues in the companies
and perform data breach activities by which the companies may suffer from financial issues.
Research methods used by the researchers
It is a kind of process that supports the researchers for emerging and applying effective plans and
approaches in the investigation. In this paper, the researchers used various research methods and
techniques, for example, research design, data collection method, research approach, and strategy
and data analysis method [6]. The significance of this section is to enhance the quality of the
research by solving challenges and problems faced by the researchers and enhancing experience
in the area of a data breach. Therefore, using effective methodology the researchers can get the
right direction in the research and achieve purposes of the investigation.
Research approach
It is identified that the researchers used an inductive approach rather than deductive due to the
subjective nature of the investigation [7]. Mainly, the inductive type of process is able to handle
the gaps in the research and provide depth observation in the area of a data breach. Using such
kind of methodology the researchers were able to construct an effective hypothesis of the
research and performed data integration effectively.
Research philosophy
It is divided into two parts including interpretivism and positivism method where interpretivism
allows the researchers for performing depth analysis while positivism help for managing the flow
of information [8]. In the adopted paper the researchers used the interpretivism type of
philosophy because of their capability to reduce errors and provide effective structure to the
3
NAME: STUDENT ID:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
authors. Therefore, using this type of method the researchers developed effective research in the
area of enterprise systems and resolved the queries of the participants.
Research design
It is the common technique used in the research for designing an effective structure of the
research. There are two essential research designs involve in the research papers for example,
qualitative and quantitative. In the qualitative design, the researchers can get theoretical data
while quantitative design provides numerical data about research concerns [9]. In this paper, a
mixed design is used that contains both these methods and performed the research in the right
direction. The researchers also used a case study for understanding the key factors that produce
data breach-related issues in the enterprise systems.
Data gathering methods
It is examined that there are two types of data used in the research counting primary and
secondary but in the chosen paper only subordinate type of data was gathered by the researchers.
The conducted literature helped the researchers for obtaining secondary data about the data
breach and previous articles also supported analyzing the impact of data leakage on the
companies [10]. Therefore, using such kind of process the researchers were capable to analyze
and resolve the problem of data breach linked with the enterprise systems.
Data analysis
In this article, the researchers used a descriptive statistical analysis process because of their
capability to provide effective outcomes of the investigation. Moreover, the researchers used
MS-Excel and SPSS tools in order to represent the obtained data into graphical and tabular
forms. Therefore, using these types of methods the researchers effectively implemented research
and achieved better outcomes in the relation of a data breach.
Findings and results
From this paper, it is found that the use of third parties and unwanted networks may produce data
breach issues in the enterprise systems. This paper shows a comparative study in the relation of a
data breach and identified that data leakage a serious problem that leads to financial issues in the
companies [11]. The conducted literature provided in-depth examination about research concerns
and content based DLPD searches can help for finding the key factors associated with the
4
NAME: STUDENT ID:
Document Page
enterprise systems. Therefore, using effective networks and secured systems can lead the
enterprise systems for enhancing the privacy of the collected data.
Issues highlighted
The authors observed that data breach is a common problem linked with the enterprise systems
due to which the companies can suffer from financial losses. It is identified that the utilization of
unauthorized networks is another problem due to which the companies are suffering from
security threats and risks [11]. It is true that data leakage negatively impacts on the
organizational performance and produce security-related problems in the enterprise systems. In
this research, the authors evaluated and highlighted the issues linked with the enterprise systems.
Conclusion of the article
The authors observed that stopping and identifying data escapes needs constant efforts and
investments from the companies. In this article, the researchers presented a depth analysis about
data leak related issues faced by the companies. Moreover, the authors labeled the state of the art
DLPD tools which have been industrialized in the last few years. While current research
provided complete information in the area of a data breach and also highlighted the prevention
techniques for improving the effectiveness of the enterprise systems. The developed research
provided depth observation in the data breach and IT security which is relevant to the research
topic.
Conclusion
From this paper, it can be concluded that data breach is a serious problem linked with the
enterprise systems that may impact on the organizational performance. This proposed paper
provided complete facts and info related to the data leakage and also highlighted the opinions of
the other researchers in IT security. It is identified that the adopted article provided each and
every point in the area of the data breach and helped the companies to understand the impacts of
unauthorized networks on personal information. Therefore, it is recommended that companies
should develop effective IT systems and enterprise systems and focus on security in order to
reduce data breach problems. Moreover, the utilization of encryption and firewall tools may help
for protecting personal data against data breach and security attacks.
5
NAME: STUDENT ID:
Document Page
References
[1].L., Cheng, F. Liu and, D.D., Yao, “Enterprise data breach: causes, challenges, prevention,
and future directions,” Wiley Interdisciplinary Reviews: Data Mining and Knowledge
Discovery, vol. 7, no. 5, pp. 12-18, 2017.
[2].C. Cadwalladr and, E., Graham-Harrison, “Revealed: 50 million Facebook profiles
harvested for Cambridge Analytica in a major data breach," Sat, vol. 17, no. 6, pp.22-03,
2018.
[3].R. Sen and, S., Borle, “Estimating the contextual risk of a data breach: An empirical
approach,” Journal of Management Information Systems, vol. 32, no. 2, pp.314-341,
2015.
[4].D.J. Solove and, D.K., Citron, “Risk and anxiety: A theory of data-breach harms,” Tex. L.
Rev., vol. 96, no. 6, p.737, 2017.
[5].N., Manworren, J. Letwat and, O., Daily, “Why you should care about the Target data
breach,” Business Horizons, vol. 59, no. 3, pp.257-266, 2016.
[6].R., Chakraborty, J., Lee, S., Bagchi-Sen, S. Upadhyaya and, H.R., Rao, “Online shopping
intention in the context of a data breach in online retail stores: An examination of older
and younger adults,” Decision Support Systems, vol. 83, no. 5, pp.47-56, 2016.
[7].S., Kashmiri, C.D. Nicol and, L., Hsu, “Protecting Retailers Against Contagion:
Exploring the Shielding Role of Marketing in the Negative Spillover of the Target
Customer Data Breach,” In Celebrating America's Pastimes: Baseball, Hot Dogs, Apple
Pie, and Marketing? vol. 12, 9, pp. 309-309, 2016.
[8].L.J. Trautman and, P.C., Ormerod, “Corporate Directors' and Officers' Cybersecurity
Standard of Care: The Yahoo Data Breach,” Am. UL Rev., vol. 66, no. 6, p.1231, 2016.
[9].L., Lee, “High Heels Hurt and So Does Data Breach, Maybe: What a Zappos SCOTUS
Decision Could Mean for Parties Seeking Relief,” Maybe: What a Zappos SCOTUS
Decision Could Mean for Parties Seeking Relief, vol. 12, no. 9, pp. 12-19, 2018.
[10]. C.M., Sharkey, “Can Data Breach Claims Survive the Economic Loss
Rule,” DePaul L. Rev., vol. 66, no. 7, p.339, 2016.
[11]. P., Rosati, M., Cummins, P., Deeney, F., Gogolin, L. van der Werff and, T., Lynn,
“The effect of data breach announcements beyond the stock price: Empirical evidence on
6
NAME: STUDENT ID:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
market activity,” International Review of Financial Analysis, vol. 49, no. 6, pp.146-154,
2017.
7
NAME: STUDENT ID:
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]