Preview

Literature Review

Good Essays
Open Document
Open Document
657 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Literature Review
Data breaches is a term that our society is becoming all too familiar with. They have been occurring more often throughout the past couple of years. An article titled “Data Breaches Keep Privacy & Security Lawyers Increasingly Busy and Looking for Recruits” written by Steven T. Taylor (2012) states “those in the business of cybercrime and protecting against cybercrime may think of 2011 as the year of the breach.”(p. 2) Cyber security has always been a big issue but the more breaches there were the more serious of an issue it became. In 2011 these data breaches affected huge companies and corporations such as Citigroup, Lockheed Martin and many others. The article discusses that it is hard to know whether these data breaches were being done from the inside or not. Not being able to determine the source of these major leaks is a scary thought. These breaches affect more than just the company and the people directly involved. Consumers and investors are going to be turned away from companies that are having security issues and as the article states, lawyers are being kept very busy.
According to Taylor (2012) “They’re working long hours to keep up to date on a river of new regulations flowing from Washington and state legislatures, advise clients on ways to prevent such e-spills, perform triage when breaches happen, and conduct a range of other activities.” (p. 2) Not only, are businesses losing money when breaches happen because people do not want to have relations with that company anymore, they also have to spend money on lawyers to help protect themselves against any future issues that may arise.
Data breaches and cyber-attacks are a major issue and yet things such as password security are still too weak. Making a password for websites and accounts is unavoidable. People mix up their passwords and often times make them easy so they can remember them. Unfortunately, this is a huge mistake. Passwords need to be complex, they need to have lower case and capital

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    HOW SHAKESPEARE PRESENTS ROMEO’S FEELINGS IN ACT 1 SCENE 1 AND ACT 2 SCENE 2…

    • 877 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Literature Review

    • 4720 Words
    • 19 Pages

    References: Allio, M. K. (2005). A short, practical guide to implementing strategy. Journal of Business…

    • 4720 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Literature Review

    • 2148 Words
    • 9 Pages

    Nursing practice uses health promotion to increase overall health of the client. The nurse is pivotal in this process in that the nurse provides education and support to the client. With the cost cutting measures being employed in healthcare, access to providers is becoming more and more precious. It is the purview of the nurse to fill the gaps between access to providers and the needs of the client.…

    • 2148 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Literature Review

    • 350 Words
    • 2 Pages

    People are less willing to participate in physical activities after they get married. The most common three reasons that why married men not participate in physical activities are: time, motivation, and age. “Married people are often older and have more responsibility for children and other factors; it could be these responsibilities which are curtailing their activity patterns. Weekends are a golden opportunity to take the family out – especially for married families – to get out and enjoy a natural environment – which has also been shown to have additional benefits.” said Dr. Len Almond. (Martin Beckford, The Telegraph News: Married couples exercise less than single people, 23 Sep. 2011) Family and work are occupying most time of married people, they might need to work for long time or take care of children when they have day off. If a married man wants to do exercise with his kids, he needs to think twice if the activity he wants to do is suitable for his kids, which may lower his interest to get involved. Day by day, they are getting older and the function of body is not as functional as young people; age becomes one of major factor that married men not get involved in exercises.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    In the recent past few months of this year, a number of tech companies have been hacked into, a few of them being Facebook, Apple, Burger King, the New York Times and NBC. It is believed by some that the responsible parties for such cyber attack has been the Chinese Government, although no concrete proof has been dug out to support the same. The statistics by Symantec, the company behind the creation of Norton Anti-virus state that almost 40% of the cyber attacks committed in the year 2012 were aimed at business organizations with staff strength of not more than 300. Almost all the companies having a domain on the internet are prone to cyber attacks, given the tools and medium of…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Good Essays

    German Seclusiveness

    • 982 Words
    • 4 Pages

    Thomas Mann, in his speech “Germany and the Germans”, talks about “German world-seclusiveness and melancholy world-unfitness” as a particular German state of mind. He says that Germany and Germans are complex because their character is so puzzling because as he traveled around the world he realized that the original nature of the German is his seclusiveness and timidity to face the world around him. Thomas Mann believes that “ In the seclusiveness of there was always so much longing for companionship: indeed at the bottom of the very loneliness that made him wicked lay always the wish to love, the wish to be loved.” (Mann, 319) This means that although the German is lonely and doesn’t fit with the world, he longs for the wish…

    • 982 Words
    • 4 Pages
    Good Essays
  • Good Essays

    pubpolessay

    • 632 Words
    • 2 Pages

    From afar, the data breach notification system may seem wholesome, however look a bit closer and you will find many insufficiencies made up of inconsistent state data breach laws that compose our nation’s standard defense against data breaches. The inconsistencies in state data breach laws cause insufficient protection of citizens, unnecessary complexities for businesses, and de-facto national requirements. Data breaches cause corporations millions of dollars and is one of the fastest growing crimes committed. For instance, California is witnessing identity theft as one of the fastest growing crimes committed. In 2000, the Los Angeles County Sheriff’s Department reported 1,932 identity theft cases, which was a 108 percent increase from the previous year. After a large amount of customer databases containing personal information were breached, security data breach notification laws were enacted by most American states since 2002. Specifically, the first security breach notification law introduced by California State Senator Peace on February 12, 2002 was law Senate Bill No. 1386 (“SB 1386”) in the state of California; it was passed unanimously by the California Senate and Assembly and it became effective July 1, 2003. Since most states follow California’s security breach laws and California is leading the nations effort in security data breach laws, I will be discussing California’s data laws in further detail, as this will focus in on issues regarding data laws in general. SB 1386 requires any company that stores its customer’s unencrypted date electronically to notify the customers if a security breach has taken place or if they have reason to believe that unencrypted date has been stolen. As defined by California’s law, personal information “includes any user name or email address, in combination with a password or security question and answer that would permit access to an online account [as well as medical…

    • 632 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Literature Review

    • 1181 Words
    • 5 Pages

    This literature review concerns the texts ‘Introduction’ from Rabelais and His World by Mikahail Bakhtin and ‘Some Psychodynamics of Orality’ from Orality and Literacy by Walter Ong.…

    • 1181 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Data on Sale

    • 657 Words
    • 3 Pages

    In one hand, from the case, we know that information that data brokers provide or sell to its customers like Internal Revenue Service and Department of Homeland Security and Justice have used for law enforcement and counterterrorism. More broadly, these data are being used to locate the assets of delinquent taxpayers, and screen candidates for federally controlled airport security workforce. Likewise, the insurance companies, banks and state and local government agencies benefits from these vast pool of personal information to develop new products and services and/or to devise their marketing strategies. In short, the data brokers are…

    • 657 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Information Security

    • 2381 Words
    • 10 Pages

    Executive Summary Key Report Findings  Page 4: Insiders Considered Greatest Organizational Security Threat  Page 5: Privileged Accounts Are Increasingly Targeted – Regardless of Attack Entry Point  Page 5: High Profile Security Incidents Impact Organizational Security Strategies  Page 6: Organizations are taking a broad approach to security in 2012  Page 7: Increasing Number of Organizations at Risk by Failing to Monitor Privileged Accounts  Page 8: Motivated Insiders Get Around Current Controls  Page 8: Employees Accessing Unauthorized Information  Page 9: Administrative Passwords – Wide Ranging Access  Page 10: Employees Plan on Taking Privileged Passwords on Way Out  Page 12: Intellectual Property – Competitive Theft  Page 13: Data Breach Notification Laws Fail to Curb Data Loss…

    • 2381 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Finally, as security failures increasingly impact on individual consumers and citizens, there is a developing regulatory agenda, particularly around the security of personal information. As a result, a business may need to shift its thinking from internal risk management to meeting external demands. (1)…

    • 782 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nature vs Technology

    • 1203 Words
    • 5 Pages

    Cited: "Dollar amount of losses by type of security crime, 2005." Electronic America. Ed. John W. Weier. 2007 ed. Detroit: Gale, 2010. Information Plus Reference Series. Gale Opposing Viewpoints In Context. Web. 12 Oct. 2011.…

    • 1203 Words
    • 5 Pages
    Better Essays