Preview

Data Breach Research Paper

Good Essays
Open Document
Open Document
1510 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Breach Research Paper
Cost of Data Breaches
When data breaches occur, it can be extremely costly towards a company. They may be required to pay fees directly to consumers, or pay for technology that increases their security so a hack does not occur again. Either way, corporations should understand the cost that a hack of consumers’ information could cost them. Ponemon Institute researched this and found, “data breaches cost companies an average of $221 per compromised record – of which $145 pertains to indirect costs, which include abnormal turnover or churn of customers and $76 represents the direct costs incurred to resolve the data breach, such as investments in technologies or legal fees” (2016 Cost of). Corporations should invest more into security systems
…show more content…

These types of trackers are known as web trackers, and are utilized on almost every website on the web. Web tracking is important to look at because Americans do express concern over internet cookies and web tracking. A poll of 1017 Americans done by Craig Newmark, Rad Campaign and Lincoln Park Strategies found, “72% are concerned about ‘Tracking Cookies’ placed on computers without consent” (Newmark). Web tracking is a process that involves a consumer as well as a website and other third parties. A consumer visits a website and then a web cookie from that site is downloaded onto the computer of the user. Third party advertisers also download a cookie that stores information about a machine. These cookies provide a unique identifier to the computer and the user. Then, if the consumer visits other websites with the same third party, or web owner, they will also know that this consumer visited another one of their pages. Tracking cookies have become extremely prominent on web pages. Keynote Systems did a report in 2012 and found “ 86% of the sites place one or more third-party tracking cookies on their visitors” (Messmer). As discussed earlier, this compromises a person's privacy information because the third-party trackers can discover which other sites a person may have been on, and considering most sites have them, a third-party cookie could nearly know every website that a person

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    While the effects of one of these attacks is realized at a much higher price for larger businesses, smaller companies are actually targeted more often because of their lack of security infrastructures and data monitoring systems. In fact Horton claims that more than 90% of data breaches affect small businesses. (Horton, 2014) These startling numbers leave many small business owners wondering what they can do to reduce the risk associated with cyber-attacks.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    company’s sensitive data? Would you even consider hiring a hacker in the first place? Why or why not?…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Back in the beginning stages of the War on Terrorism, President Bush enacted the Patriot Act. This allowed the government to spy on citizens, monitoring their activities in order to discern whether or not someone is a terrorist. It brought about changes in law enforcement that allowed agencies to search phones, financial records, etc.…

    • 447 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Technological Advances and Ethical Issues precipitating the passage of the Patriot Act and the Federal Information Security Management Act…

    • 780 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    When it comes to protecting and saving lives of the American people, private invasion used in order to locate and capture potential terrorist should be unlimited. The 911 attack has provided active proof to the American peoples of the damage that terrorist groups can impose on our society. Therefore, invading the privacy of individuals may prevent future terrorist attacks.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Munchausen syndrome by proxy, MSBP, is a covert form of child abuse in which a parent or guardian, usually the mother, systematically fabricates or induces illness in her child. It proves a difficult syndrome to diagnose because the caretakers of these children are masters of deception. They thrive on deceiving medical and mental health professionals and revel in the attention received (Quisenberry).…

    • 842 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Edward Snowden harmed the United States by warning them. He warned them that they were being watch. So everyone was careful now to not get caught. Some people even stopped using technology to avoid trouble. Edward Snowden harmed the United States because he warned people, copied classified information, and made terrorist change their meaning of communication.…

    • 475 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Patriot Act Research Paper

    • 3074 Words
    • 13 Pages

    Since the aftermath of the terrorist attack of September 11th. 2014. The Patriot Act was enabled to enhance domestic security of the state, and federal branch of the government, it was ushered in out of the fear the terrorist were here in masses. While we all were concerned with the safety of the people and our country, few knew the underlying damaging message of The Patriot Act to our Bill Of Rights of the United States. Our founding fathers created the constitution to protect us against these cruel and unethical practices. The Patriot Act discards these constitutional…

    • 3074 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Internet Exercise

    • 1886 Words
    • 8 Pages

    * Internet marketers use browser cookies to keep track of consumers’ behavior. Browser cookie is a small piece of data sent from a website and stored in a user’s web browser while a user is browsing a website.…

    • 1886 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    The list of infamous traitors is short and perhaps less well-known than other less significant lists, like the list of this year’s Oscar nominees. There was; Brutus, Tokyo Rose, Mata Hari, Benedict Arnold, John Anthony Walker Jr., and Judas who was one of the twelve disciples, and perhaps the most well-known of all traitors, he betrayed Jesus for a mere handful of coins. This list is incomplete, but it lists traitors who were both foreign and domestic, from modern day to the time of the Old Testament. Some of these traitors were responsible for the loss of lives, and others were not. Edward Snowden is the current candidate for traitor, and claims…

    • 2025 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Another prime example of the dangers of data is the possibility of data tracking. Companies and government agencies alike, use data based on people’s internet activity to actively…

    • 1537 Words
    • 7 Pages
    Better Essays
  • Good Essays

    When a company suffers from fraud from any source, the consumers are the ones that suffer. Companies make up the difference by raising costs, which ultimately means higher prices for consumers. Employees suffer because their hours, job, and their pay may be less. Investors and employees may find themselves unable to pay off loans, and credit becomes harder to obtain (McGrath, J.,…

    • 432 Words
    • 2 Pages
    Good Essays