Preview

Literature Review

Good Essays
Open Document
Open Document
657 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Literature Review
Data breaches is a term that our society is becoming all too familiar with. They have been occurring more often throughout the past couple of years. An article titled “Data Breaches Keep Privacy & Security Lawyers Increasingly Busy and Looking for Recruits” written by Steven T. Taylor (2012) states “those in the business of cybercrime and protecting against cybercrime may think of 2011 as the year of the breach.”(p. 2) Cyber security has always been a big issue but the more breaches there were the more serious of an issue it became. In 2011 these data breaches affected huge companies and corporations such as Citigroup, Lockheed Martin and many others. The article discusses that it is hard to know whether these data breaches were being done from the inside or not. Not being able to determine the source of these major leaks is a scary thought. These breaches affect more than just the company and the people directly involved. Consumers and investors are going to be turned away from companies that are having security issues and as the article states, lawyers are being kept very busy.
According to Taylor (2012) “They’re working long hours to keep up to date on a river of new regulations flowing from Washington and state legislatures, advise clients on ways to prevent such e-spills, perform triage when breaches happen, and conduct a range of other activities.” (p. 2) Not only, are businesses losing money when breaches happen because people do not want to have relations with that company anymore, they also have to spend money on lawyers to help protect themselves against any future issues that may arise.
Data breaches and cyber-attacks are a major issue and yet things such as password security are still too weak. Making a password for websites and accounts is unavoidable. People mix up their passwords and often times make them easy so they can remember them. Unfortunately, this is a huge mistake. Passwords need to be complex, they need to have lower case and capital

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Literature Review

    • 4720 Words
    • 19 Pages

    References: Allio, M. K. (2005). A short, practical guide to implementing strategy. Journal of Business…

    • 4720 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Literature Review

    • 2148 Words
    • 9 Pages

    Nursing practice uses health promotion to increase overall health of the client. The nurse is pivotal in this process in that the nurse provides education and support to the client. With the cost cutting measures being employed in healthcare, access to providers is becoming more and more precious. It is the purview of the nurse to fill the gaps between access to providers and the needs of the client.…

    • 2148 Words
    • 9 Pages
    Better Essays
  • Best Essays

    In the recent past few months of this year, a number of tech companies have been hacked into, a few of them being Facebook, Apple, Burger King, the New York Times and NBC. It is believed by some that the responsible parties for such cyber attack has been the Chinese Government, although no concrete proof has been dug out to support the same. The statistics by Symantec, the company behind the creation of Norton Anti-virus state that almost 40% of the cyber attacks committed in the year 2012 were aimed at business organizations with staff strength of not more than 300. Almost all the companies having a domain on the internet are prone to cyber attacks, given the tools and medium of…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Unfortunately, as consumers are not privy to the defense measures a firm has and it is highly unlikely that a company would share the same, hackers would love to steal this kind of data.…

    • 720 Words
    • 3 Pages
    Good Essays
  • Good Essays

    pubpolessay

    • 632 Words
    • 2 Pages

    From afar, the data breach notification system may seem wholesome, however look a bit closer and you will find many insufficiencies made up of inconsistent state data breach laws that compose our nation’s standard defense against data breaches. The inconsistencies in state data breach laws cause insufficient protection of citizens, unnecessary complexities for businesses, and de-facto national requirements. Data breaches cause corporations millions of dollars and is one of the fastest growing crimes committed. For instance, California is witnessing identity theft as one of the fastest growing crimes committed. In 2000, the Los Angeles County Sheriff’s Department reported 1,932 identity theft cases, which was a 108 percent increase from the previous year. After a large amount of customer databases containing personal information were breached, security data breach notification laws were enacted by most American states since 2002. Specifically, the first security breach notification law introduced by California State Senator Peace on February 12, 2002 was law Senate Bill No. 1386 (“SB 1386”) in the state of California; it was passed unanimously by the California Senate and Assembly and it became effective July 1, 2003. Since most states follow California’s security breach laws and California is leading the nations effort in security data breach laws, I will be discussing California’s data laws in further detail, as this will focus in on issues regarding data laws in general. SB 1386 requires any company that stores its customer’s unencrypted date electronically to notify the customers if a security breach has taken place or if they have reason to believe that unencrypted date has been stolen. As defined by California’s law, personal information “includes any user name or email address, in combination with a password or security question and answer that would permit access to an online account [as well as medical…

    • 632 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Data on Sale

    • 657 Words
    • 3 Pages

    In one hand, from the case, we know that information that data brokers provide or sell to its customers like Internal Revenue Service and Department of Homeland Security and Justice have used for law enforcement and counterterrorism. More broadly, these data are being used to locate the assets of delinquent taxpayers, and screen candidates for federally controlled airport security workforce. Likewise, the insurance companies, banks and state and local government agencies benefits from these vast pool of personal information to develop new products and services and/or to devise their marketing strategies. In short, the data brokers are…

    • 657 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Literature Review

    • 1427 Words
    • 6 Pages

    ‘Making it a Success’ written by Sue Larkey is a book which has many strategies and worksheets to use during a literacy lesson for students with Autistic spectrum disorder. Larkey identifies Autism Spectrum disorder (ASD) as ‘A lifelong developmental disability affecting about 1 in 500 people. Confused by the world around them, people with an Autism spectrum Disorder need help to fit in. They have great difficulty understanding what they see, hear and otherwise sense’ (Larkey, 2008)…

    • 1427 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Literature Review

    • 1181 Words
    • 5 Pages

    This literature review concerns the texts ‘Introduction’ from Rabelais and His World by Mikahail Bakhtin and ‘Some Psychodynamics of Orality’ from Orality and Literacy by Walter Ong.…

    • 1181 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 2381 Words
    • 10 Pages

    Executive Summary Key Report Findings  Page 4: Insiders Considered Greatest Organizational Security Threat  Page 5: Privileged Accounts Are Increasingly Targeted – Regardless of Attack Entry Point  Page 5: High Profile Security Incidents Impact Organizational Security Strategies  Page 6: Organizations are taking a broad approach to security in 2012  Page 7: Increasing Number of Organizations at Risk by Failing to Monitor Privileged Accounts  Page 8: Motivated Insiders Get Around Current Controls  Page 8: Employees Accessing Unauthorized Information  Page 9: Administrative Passwords – Wide Ranging Access  Page 10: Employees Plan on Taking Privileged Passwords on Way Out  Page 12: Intellectual Property – Competitive Theft  Page 13: Data Breach Notification Laws Fail to Curb Data Loss…

    • 2381 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Literature Review

    • 1670 Words
    • 7 Pages

    Alcohol related problems is one of today’s contemporary issues, as there are studies that suggest that due to alcohol related problems there are various impacts that it can have to an individual, and it can include social harms and any antisocial behaviour, such as alcohol fuelled violence. This literature review will explore the academic readings, that help assist identity key issues relating to a criminology perspective of alcohol related problems. Ergo, based on past research from the academic readings this literature review will explore prevention strategies that help reduce social harm to the individual and the community, and also the consequences that alcohol can lead to. Also, this literature review, has identified gaps within the academic sources. The gaps that all the sources have in common would be, the use of education and intervention for the individuals on alcohol related problems to control criminal behaviours before it is too late and also, the lack of numeric statistics and evidences supporting the academic sources.…

    • 1670 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Finally, as security failures increasingly impact on individual consumers and citizens, there is a developing regulatory agenda, particularly around the security of personal information. As a result, a business may need to shift its thinking from internal risk management to meeting external demands. (1)…

    • 782 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nature vs Technology

    • 1203 Words
    • 5 Pages

    Cited: "Dollar amount of losses by type of security crime, 2005." Electronic America. Ed. John W. Weier. 2007 ed. Detroit: Gale, 2010. Information Plus Reference Series. Gale Opposing Viewpoints In Context. Web. 12 Oct. 2011.…

    • 1203 Words
    • 5 Pages
    Better Essays