StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Implications of Security Breaches - Essay Example

Cite this document
Summary
The paper "The Implications of Security Breaches" discusses that breaches diminish the public’s confidence in reliance on using technological applications as these violate privacy. Organizations that were victimized by security breach incidents have reported generating significant financial losses…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
The Implications of Security Breaches
Read Text Preview

Extract of sample "The Implications of Security Breaches"

Concerns are warranted since according to the information provided by Buenaventura (2011), “130,000,000 credit card numbers was compromised 2 years ago, which still holds the record for the largest security breach on the Internet” (par. 11). These are potentially influenced by age, educational background and profession since those who are prolific users of the internet are mostly the young generations and those who unsuspectingly divulge personal information.
Discussion 2: Potential Consequences: Discuss what the consequences should be for not adhering to security policy guidelines. Where or how should these consequences be communicated to employees? Do you think there should be stronger and better-defined government-specified policies/laws for the general public? Organizations that define security policy guidelines should indicate infractions and penalties for violations. These should be communicated to the employees through their policy manuals and code of discipline. One strongly believes that stronger and better-defined government-specified policies and regulations; as well as stiffer penalties for those found to be violating security protocols and standards on privacy and confidentiality should be imposed to minimize and ultimately eliminate security breaches.

Discussion 3: Tell me what is on your mind about Information Systems and operating systems. What good articles have you read lately? Tell me what you think about this discussion question. Information systems (IS) are “used to capture, create, store, process or distribute classified information must be properly managed to protect against unauthorized disclosure of classified information, loss of data integrity, and to ensure the availability of the data and system” (Information System Security, n.d., par. 1). Operating systems (OS_, on the other hand, is a program that manages the data and resources of the computer system. Articles on IS and OS can be accessed from various computer journals and publications which are also available online such as the InformIT site. One could gain from being exposed to updated information from both IT and OS regarding security breaches and intensifying protection of private and personal information by reading articles from identified sites. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discussion 1 Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1589746-discussion-1
(Discussion 1 Essay Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1589746-discussion-1.
“Discussion 1 Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1589746-discussion-1.
  • Cited: 2 times

CHECK THESE SAMPLES OF The Implications of Security Breaches

Social, legal and ethical aspects of IS security and privacy

This research paper gives a critical review of the social, legal and ethical aspects which relate to the security and privacy of information within information systems in addition to recommendations on the appropriate approaches of curbing the information security concerns of organizations.... Information System security and Privacy Within information systems, individuals desire to have data or information about them be kept safe from unwarranted, unauthorized access and use for malicious intentions....
16 Pages (4000 words) Research Paper

Business Implications of Security on the Internet

Business implications of security on the Internet Name: Course: Instructor: Date: Business implications of security on the Internet The internet has transformed the way in which most businesses operate.... Loss of revenue is one of the major business implications of security on the internet.... Due to the rise of internet security breaches, businesses may be forced to implement certain measures that ultimately lower all their employees' productivity....
3 Pages (750 words) Essay

Methodologies to Minimize the Chances of Database Breach Recurrence

The paper "Methodologies to Minimize the Chances of Database Breach Recurrence" discusses processes, practices, and methodologies alongside technologies that can be adopted by higher educational institutions in order to mitigate the risks and threats associated with data breaches and computer hacks.... Close to 160 data breaches have been experienced by higher education institutions since the year 2008 without over close to 2.... A lower number of breaches: 57 was reported in 2009....
8 Pages (2000 words) Case Study

Corporate Security Breaches

The paper "Corporate security breaches" tells that corporations are incorporated bodies that consist of a tremendously large number of shareholders, and in which the actual ownership of the entity can be transferred at any moment without the approval of other shareholders.... orporate security breaches occur when the hackers exploit the employees through means of some social engineering and other scams (Cubbage and Brooks 2012).... They have seen that an exceedingly large number of the society is not security conscious at all....
8 Pages (2000 words) Essay

The Influence of Radio Frequency Identification on the Environment

These include its applications in learning institutions as well for security reasons.... The paper gives detailed information about the implication of radio frequency identification on the environment and humans and animals.... "The Influence of Radio Frequency Identification on the Environment" provides a detailed analysis of RFID, how it works and how it influences humans and animals....
6 Pages (1500 words) Research Paper

TWeb-Based Enterprise Applications Security Guidelines

The paper "Web-Based Enterprise Applications Security Guidelines" discusses that proper approaches that can provide comprehensive protection from security breaches comprising intrusion detection and control of information access are required for developing secure web-based enterprise applications.... In line with the increasing demand and utilization of web-based enterprise applications, new level of security threats will likely appear.... The project discusses various web security issues that must be considered by application developers....
7 Pages (1750 words) Research Paper

Database Security Controls

However, we can see that with all the changes and innovations, the risk on security of the databases is a new challenge and constant concern for everybody in our time.... This paper also outlines the damage, the breach in the security in database can cause.... he aim of this research is to analyze the current attacks and to assess the security of corporate databases and the related issues which are increasingly becoming significant as enterprises are growing and considering the data they have stored in them....
12 Pages (3000 words) Literature review

Security Implications of Digital Certificates and Inadequate Legislation

This literature review "Security implications of Digital Certificates and Inadequate Legislation" presents data security as a great concern for every organization, information managers, and some individuals.... ecurity breaches of certificate authoritiesAn attack on certificate authorities has devastating consequences.... Therefore, it is essential that people and entities entitled to security of data in any information system remain proactive and have great knowledge of occurring security issues....
20 Pages (5000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us