Preview

Preventing Security Breaches

Satisfactory Essays
Open Document
Open Document
533 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Preventing Security Breaches
Preventing Security Breaches
Darleen Busot
BIS/221
February 2, 2015
James Boykin

Preventing Security Breaches
The era of the Internet is giving people many tools and advantages that help them been available at any time and place and they are been more productive. It has also helped corporations becoming efficient and increased their exposure to the public. All pros come with cons, and the Internet cons are affecting people and corporations as well. People and companies are been exposed to the dark side of the Internet with security breaches.
Security breach is the new way of thieves taking advantages of others by stealing personal data, credit cards, and social security numbers for financial benefit. Companies are also suffering from this problem with hackers stealing information from their servers for a very lucrative business. Security breaches are very costly and difficult to fix it causes a chain reaction that not only affects the person or company involved it affects others.
In April 2014 Home Depot, the largest home improvement company in the world, had one of the biggest company security breaches in history. All their customer’s credit card information was stolen and compromised. Upon joint investigation with a third party company and law enforcement it was determined that criminal used a third party vendor to steal the data from their servers. The hackers used malwares on the checkout system to steal customer’s credit and debit cards information to be sold in the black market. The malware that was sent to their systems has never been seen before, and it was highly design to evade detection (Home Depot, 2014).
Preventing security breaches is important for corporations as well for individuals. Viruses, Trojan horses, and worms can infect computer systems having major effects on the affected party. Most viruses and malwares are received via email, dubious websites, and instant messaging’s with links. Existing prevention software’s can only determine

You May Also Find These Documents Helpful

  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Waves of targeted email attacks, often called phishing, are exploiting client side vulnerabilities in commonly used programs such as Adobe PDF Quick Time, Adobe Flash, and Microsoft Office. This is currently the primary initial infection vector used to compromise computers that have access to the internet and the network.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    Accessing data within an organization on a regular basis is much easier with the help of an insider, and security firms are reporting an increase in the number of data breach incidents that can be linked to an insider who has been coerced by the hackers into co-operating.…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    McGregor, J. P. How the TJX Breach May Change Security Awareness. (2007, April 11). Retrieved October 9, 2007, from https://www.scmagazineus.com…

    • 302 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There are more cons than pros for the Internet. Nicholas Carr has many great pieces of evidence to support his thesis. I agree because the Internet can take you down many wrong paths but at the same time technology is our future. Today people are not focusing on trying to improve our future, they are worried about today’s fashion or video games or celebrities. One of the studies Carr looked at was by Cornell which figured out that web surfing does distract students. This is good information for schools on how to help their students learn in the best way, and stay on track. The neuroscientist named Michael Merzenich made a very dramatic reason what the long-term effects of the Internet. Merzenich said the Internet could lead to death, which could be right but we don’t have any proof at the moment. At the same time, I think the Internet is a great source for information. I wish Carr talked a little about how the Internet also has important information…

    • 596 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security breaches affect businesses all over the corporate America. Every day there are thousands of companies that are in threat and danger of being affected by this issue. Each business can be affected deeply by this problem. Security breaches can tarnish and blemish the image of the company and create significant tangible and intangible losses for a business.…

    • 435 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    With more and more regularity, we learn about the loss of personal and financial information because of cybercrimes originating from around the world. Elections, power grids, movie productions companies, government agencies, and financial institutions are vulnerable to cybercriminals. Each time a breach occurs we hope that it will not reach our personal or business lives. However, the likelihood of staying cyber safe seems less and less likely to happen. One only has to look at the Equifax fiasco, which alone resulted in the loss of personal financial data for 143 million Americans.…

    • 92 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Home > Technology > Managing Technology > 5 Ways to Avoid a Costly Data Security Breach…

    • 823 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Data Breach

    • 2467 Words
    • 10 Pages

     Don’t underestimate the tenacity of your adversaries, especially espionage- driven attackers, or the power of the intelligence and tools at your disposal (2013 Data Breach Investigations Report, 2013).…

    • 2467 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Information is what keeps this seemingly chaotic world functioning systematically. Not so long ago, information was physically present, printed or written on papers. To convey important information or messages, we used letters that took some time to reach its destination. Once our civilization invented and learned how to use electricity to store and send information, we never stopped since. Most of our important information is now being created, stored and sent through vast network of information superhighways. Information security threats were present even before we went digital and information security threats pose much greater…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Virtually every business today uses at least one form of computer information technology. Business firms use computers to automate and assist in managing everything from operations, sales, finance, and logistics. Internal databases and intranets are used for internal controls and organizations are connected via the internet to conduct sales, marketing and many other communications and transactions. Electronic business, or e-business, is dominating modern markets and the business world. This new world of technological innovation has exponentially increased efficiency and globalized the world’s economies. Unfortunately criminals still exist and continue to exploit businesses, committing acts of theft, vandalism, and terror. E-business is not immune to criminal mischief and in fact can be quite vulnerable to sophisticated cyber criminals known as hackers. In early 2008 it was reported that the North East Supermarket mogul, Hannaford Bros. Company fell victim to a computer hacking attack that compromised approximately 4.2 million customer credit cards. This act created a financial nightmare for thousands of consumers and for the Hannaford Bros. grocery company. The incident was a black mark on Hannaford’s public image and a financial burden to their corporation. Cyber Security is a growing priority of today’s business leadership. Boon, Kurtz (2011)…

    • 1647 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Overall lack of awareness by the consumer in terms of steps taken to mitigate breach risks…

    • 1054 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Technology In America

    • 559 Words
    • 3 Pages

    Technology is improving and advancing rapidly every day. New inventions and ideas are thought of and produced so quickly that new versions of a certain technology are proved outdated within months of their release. Our lives have been made simpler with devices such as GPS, advanced medical equipment and smart phones that can do almost anything it is told to do. However, nothing really compares to the introduction and growth of the Internet. The Internet has had the largest effect on life in this country. It connects humans to each other in various ways all over the world, as well as providing outlets for ideas and creativity to grow and become something profitable. Having connection to the internet is like having the world at my fingertips. Possibilities and opportunities are limitless.…

    • 559 Words
    • 3 Pages
    Good Essays