Data Breaches Essay Sample

Data breaches is a term that our society is going all excessively familiar with. They have been happening more frequently throughout the past twosome of old ages. An article titled “Data Breaches Keep Privacy & A ; Security Lawyers Increasingly Busy and Looking for Recruits” written by Steven T. Taylor ( 2012 ) provinces “those in the concern of cybercrime and protecting against cybercrime may believe of 2011 as the twelvemonth of the breach. ” ( p. 2 ) Cyber security has ever been a large issue but the more breaches there were the more serious of an issue it became. In 2011 these informations breaches affected immense companies and corporations such as Citigroup. Lockheed Martin and many others. The article discusses that it is difficult to cognize whether these informations breaches were being done from the interior or non. Not being able to find the beginning of these major leaks is a chilling idea. These breaches affect more than merely the company and the people straight involved.

Consumers and investors are traveling to be turned away from companies that are holding security issues and as the article provinces. attorneies are being kept really busy. Harmonizing to Taylor ( 2012 ) “They’re working long hours to maintain up to day of the month on a river of new ordinances fluxing from Washington and province legislative assemblies. advise clients on ways to forestall such e-spills. perform triage when breaches happen. and carry on a scope of other activities. ” ( p. 2 ) Not merely. are concerns losing money when breaches happen because people do non desire to hold dealingss with that company any longer. they besides have to pass money on attorneies to assist protect themselves against any future issues that may originate. Data breaches and cyber-attacks are a major issue and yet things such as password security are still excessively weak. Making a watchword for web sites and histories is ineluctable. Peoples mix up their watchwords and frequently times make them easy so they can retrieve them. Unfortunately. this is a immense error.

ALSO READ  Integrative Network Design Project Essay Sample

Passwords need to be complex. they need to hold lower instance and capital letters every bit good as Numberss in symbols. By holding a stronger watchword it makes the occupation of a hacker more hard but. security should non entirely depend on a watchword. In the article. “Password Security Remains the Weakest Link Even After Big Data Breaches” writer Fahmida Rashid ( 2011 ) portions with us that “Security experts recommend taking a multilayered attack to security. Alternatively of trusting on a individual point of failure. organisations should be implementing several mechanisms to do it harder for cyber aggressors to steal sensitive. confidential information. ” ( p. 38 ) . The more beds of protection the better. There is no such thing as entire protection from cyber-crimes. But. by doing informations harder to make and utilizing multiple beds of protection will fend off some hackers because the work is greater than the final payment ( Rashid. 2011 p. 38 ) Although. merely because acquiring through a system is hard does non intend that a determined hacker will non acquire through.

When it comes to security it is all about doing the other person’s undertaking every bit hard as possible to finish. In the article “Cracking the Code on Cyber Crimes” the writer Kelly Liyaka ( 2012 ) states “The general consensus among security experts is that cyber larceny will perpetuate because of the nature of the Internet. ” ( p. 38 ) . This is why it is damaging to take the proper protection and security steps. Liyaka ( 2012 ) portions that “Experts say that neglecting to implement security steps for your concern can be a small like driving without insurance in hopes that you’ll avoid a clang. ” ( p. 39 ) . Driving without insurance is a dense move and so is carry oning a concern or sharing private without any cyber security.



Curses! Hacked Again. ( 2014 ) . Consumer Reports. 79 ( 11 ) . 16
Liyakasa. K. ( 2012 ) . Cracking the Code on Cyber Crimes. CRM Magazine. 16 ( 9 ) . 36-40 Rashid. F. Y. ( 2011 ) . Password Security Remains the Weakest Link After Big Data Breaches. Eweek 28 ( 11 ) . 38-39 Taylor. S. T. ( 2012 ) . Data Breaches Keep Privacy- & A ; -Security Lawyers Increasingly Busy and Looking for Recruits. 31 ( 2 ) . 1-18 Weiss. S. ( 2011 ) . Tempting Target. State Legislatures. 37 ( 6 ) . 30-32