Data Breach Research Papaer Essay

1475 words - 6 pages

Secure or Breached?
As technology is becoming more prevalent the manner in which we store information is changing. Gone are the days of information being stored into file cabinets. Instead information is stored in databases, a system of hard drives that stores information electronically normally accessible remotely. With this comes a rise in hackers and correspondingly a rise in security breaches, where hackers have access to sensitive information. Vulnerabilities are the root of all hacks. For businesses, they result in a decline in reliability. If an individual or a group wants to breach information, they will almost always find a way. With the increasing need for information databases, ...view middle of the document...

In 2014 another breach occurred, with the internet giant eBay. Fortunately, this breach only involved the theft of names, addresses, and dates of birth as well as manipulation of user passwords. In 2016 the largest data breach happened at Mossack Fonseca a panama law firm. The data contained information on wealthy people who invested money in fake companies in a tax evasion scheme. In the words of Lou Shipley a professor at MIT and writer for the Huffington Post the breach “sent shock waves around the world recently with the prime minister of Iceland stepping aside, Swiss authorities raiding the headquarters of the Union of European Football Associations, and relatives of the president of China linked to offshore companies”(Shipley). With breaches becoming more common its clear many are at a loss of what to do
Laws and Combating Cyber Crimes
With breaches becoming more common we are finding that the laws currently in place are not sufficient enough to protect victims and punish criminals. However, congress has been making strides in the right direction over the past few years. As of now most code is protected under the first amendment's free speech clause; meaning the writing of malicious code is protected. The use of such code is not protected under the first amendment and is a felony. However “it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce. Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.” (WGBH educational foundation) However, the odds of finding the creator of the malicious code are slim, making this penalty almost obsolete. Identify theft is protected under the Identity Theft and Assumption Deterrence Act but only discusses punishment of the violator. This is another law that does not clearly prohibit cybercrime. “It criminalizes identity theft and allows courts to assess the losses suffered by individual consumers” which does not specify the form in which identity theft must take place. Laws prohibiting and punishing cybercrimes are less effective when the root of the problem cannot be tracked. For as controversial as the topic is, there may not be laws in effect fully prohibiting cybercrimes to a full extent.
Motives behind the hack
Reasons behind a data breach are just as varied as the people who carry them out. Most hackers fall in one of three categories, white hat, black hat, and grey hat hackers. The white hat hacker is a person who hacks legally; no information is stolen or vulnerabilities exploited. Instead, white hat hackers are hired by companies to try and breach the security in place, they then inform said company of how they managed to bypass security masseurs in order to help patch exploits in the security. Then there is the black hat hackers, these hackers hack without permission for self-gain or for the challenge. They normally steal information like credit card...

Other Papers Like Data Breach Research Papaer

Case Study Analysis

2437 words - 10 pages Doncaster, a suburb of Melbourne, Australia and started to buy and sell bicycles and spare parts and named his business as Dylan Customized Bicycles (DCB). However, the business was a successful one; he faced lots of challenges to ensure the smooth running of DCB. Dylan had traditional undertook all the roles in the store from addressing the customers to managing the day to day operations of the store. He never used to keep real cost data. Instead

Effective Enterprise Key Management Essay

815 words - 4 pages Effective enterprise key management Driven by issues to prevent data breach and meet regulatory compliance requirements companies are encrypting critical data at an alarming rate. Added to this issue is the renaissance in encryption driven by cloud computing, mobile technology and basic security needs. To protect sensitive data the process involved is using native encryption software’s throughout the organization; this increases the

Data to Knowledge

1489 words - 6 pages the data will be possible but complete de-indentification will not be conducive to the project as there may be a need to contact subjects after screening. Providing a clear, concise explanation of how the data will be used to answer the research question provides informed consent and protects subjects’ rights to allow data to be used and protects their right of withdrawal of that consent at anytime. Determination of need for an Institutional

Identity Theft and Protection of Ppi

1299 words - 6 pages Identity theft is one of the fastest growing crimes in the United States. From empty bank accounts to ruined credit reports, there are numerous ways that an identity thief could hurt you. While identity theft is not new, the advent of the internet has given thieves new ways of using your personal data as their own for their benefit. According to Javelin Strategy and Research (2014), in 2013, over l3 million people were victims of some type of

Target Financial Analysis

2351 words - 10 pages the other hand, operates as a store with less-bulky items that would not easily fit in to a small apartment. With customers demanding easy accessibility, Target’s reputation as a “superstore” allows customers to save time by purchasing diverse items, such as a sweater and a spatula, in one location. In December of 2013, Target confirmed a breach of customer credit card data, resulting in the second largest breach of a retailer in history. By the

Intellectual Property Clause

1120 words - 5 pages authorized and/or unauthorized use(s), and incorporate this information into the original contract, which makes it legally binding (Connock, 1994). The following is an example of an IP clause: “Intellectual Property,” or “IP,” refers to the trade secrets, copyrights, trademarks, patents, and patentable ideas relating thereto of Developer, including but not limited to the know-how, inventions, technologies and technical data relating thereto

The Ethical Use of Information Technology.Docx

1050 words - 5 pages -your-business-from-a-data-breach/?_php=true&_type=blogs&_r=0 Neethling, J., Potgieter, J.M. & Visser, P.J. 1996. Neethling's law of personality. Durban: Butterworths. -------------------------------------------- [ 1 ]. GDRC- THE GLOBAL DEVELOPMENT RESEARCH CENTER [ 2 ]. Armando D’Accordo, owner of CMIT Solutions [ 3 ]. JP Morgan’s database was hacked on Friday October 3, 2014

Security and Loss

748 words - 3 pages the gain or loss by each of the parties that might have some hidden agenda or causes. Finding timelines of occurrences and location of events and information about the physical environment will help us to build a history of the problem. We will establish what type of research or projects the Professor was working on and teaching and who might be interested in this data .Since not all identity thefts are for financial gain but are sometimes used to

Assignment 4: Internet Technology, Marketing, and Security

1305 words - 6 pages identity theft. References Mintzer, Rich. (2011, October 3). More Than 300 Corporate Security Breaches Reported in 2011. http://www.savingsaccounts.com. Scott, Damien. Bracetti, Alex. (2012, May 9). The 11 Worst Online Security Breaches. http://www.complex.com. Lina. (2011, May 4). Sony’s Security Breach May Be the Biggest Personal Data Heist in History. http://www.lavasoft.com. Olson, Parmy. (2011, October 12). Sony

Kudler Service Request

1262 words - 6 pages outline to legal requirements involving the gathering, retention, and distribution of customer data. Management at Kudler Fine Foods will have to research local, state, federal, and industry regulations pertaining to the types of data used in the system. These legal restrictions may alter decisions made on what kind of data can be collected and will affect how the company must make notice to customers about the data collected. Regulations can also

Biomedical

1501 words - 7 pages documentation of informed consent may be granted when: The only record linking the subject and the research is the consent document and the principal risk is a breach of confidentiality. 5. As part of the consent process, the federal regulations require researchers to: Provide potential subjects with information at the appropriate reading comprehension level. 1. Data are made anonymous by Destroying all identifiers connected to the data. 2

Related Essays

Target: The Largest Data Breach/Attack Essay

1651 words - 7 pages In December 2013, Target was attacked by a cyber-attack due to a data breach. Target is a widely known retailer that has millions of consumers flocking every day to the retailer to partake in the stores wonders. The Target Data Breach is now known as the largest data breach/attack surpassing the TJX data breach in 2007. “The second-biggest attack struck TJX Companies, the parent company of TJMaxx and Marshall’s, which said in 2007 that about 45

Citi Program Essay

748 words - 3 pages numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which of the following statements best characterizes what occurred? Your answer: There was both a violation of privacy and a breach of confidentiality. Correct Answer: There was neither a violation of privacy nor a breach of confidentiality

Network Security Essay

586 words - 3 pages be allowed to the company network unless approved by VP or higher. Why such drastic measures, as I mentioned earlier network downtime or a data breach can cause major losses that could be devastating to any company. We can take the example of the Target data breach incident of 2013 where millions of customer’s credit and debit card information was stolen by a data breach. A simple task such as keeping a contractors password secured or a

Ipad Security Breach Essay

1876 words - 8 pages the Gawker, after they say AT&T was notified & the vulnerability was closed. Gawker published some data with the emails removed. All the data was gathered from the public web server that was accessible by anybody on the Internet. There was no intrusion, no breach, or penetration, through any means. AT&T has characterized this incident as an un-authorized computer hacking, to exploit the function designed for making the iPad log in process faster