topic: Cyber security: Data integrity threats to organizatins make a presentation on the given topic.you can use the information provided in the attached documents I am attaching all the work done so

Article

Human Error

Transfer Error

Cyber Attacks

Compromised Hardware

Malware

Belkacem & Bouhamdi (2018)

Nedal & Sail (2013)

Morovat (2015)

Patel et al. (2015)

Kavale. (2012)

Rodríguez & American Society for Quality (2019).

Kim, & SecTech (2010)

Citations of Selected Articles

Article 1

Article 2

Article 3

Article 4

Article 5

Belkacem, A., & .Bouhamdi, A. (2018). “Model for decision-making process with big data,” Journal of Theoretical and Applied Information Technology, vol. 96, p. 5951 – 596

Nedal, A., & Sail, A., (2013). “Data integrity in cloud computing security,” Journal of Theoretical and Applied Information Technology, Vol. 58, no. 3, p. 570.

Morovat, K. (2015). Data Integrity Verification in Cloud Computing.

Patel, N., Shah, P., & Prajapati, P. (2015). Efficient Data Recovery with Data Integrity Proetection. Saarbrucken: LAP LAMBERT Academic Publishing.

Kavale, S. (2012). “The role of data in strategic decision making process,” International journal of current research, vol. 4, no. 4, p. 01-07.

Rodríguez, P. J., & American Society for Quality,. (2019). Data integrity and compliance: A primer for medical product manufacturers.

Kim, T., & SecTech. (2010). Security Technology, Disaster Recovery and Business Continuity: International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings.

Reason for choosing this source

This article is a good source due to its availability and good authors.

This source touches on the main topic and gives an in depth analysis of data integrity.

This source is simplified and gives proper insight on data integrity.

This source not only focuses on the causes of loss of data but also the means of repairing loss.

This source gives the reason for data breaches and the best way to rid of them.

This article shows the importance of compliance in achieving data integrity.

This article focuses on security, disaster recovery and business continuity in terms of breach.

Brief Description of the source.

This source looks at big data and how it can be easily managed. It recognizes the susceptibility of big data to many breaches and the focal points for cyber-attacks.

This source beliefs that cloud computing is the best way to store data. It therefore focuses on how cloud computing can be made safe and secure from breaches.

This source focuses on verification of data integrity in cloud computing. It looks to find the sources of breaches and how they get into the system even in secure scenarios.

This source looks to cover all grounds from protection, breach and recovery. It tackles all the problems and tries to find the link between all the processes.

This source looks at how strategically handling data and the potential threats to data integrity can save a company from any breach.

The source looks at the legal side of breaches. Companies may have to pay fines if their data integrity is compromised and should look to compliance to help them.

This article is on the security from the potential sources of breaches. It also shows how business continuity can be achieved.

Data Integrity attacks

  • Managing big data

  • Protection from breaches in big data.

  • Transfer error

  • Cyber Attacks

  • Compromised Hardware

  • Malware

  • Storage of data in cloud

  • Human error

  • Cyber Attacks

  • Compromised hardware

  • Malware

  • Transfer Error

  • Human Error

  • Compromised Hardware

  • Data Recovery

  • Human error

  • Cyber Attacks

  • Compromised hardware

  • Malware

  • Malware

  • Human Error

  • Compromised Hardware

  • Data Recovery

  • Transfer Error

  • Malware

  • Compromised Hardware

  • Data Recovery

Solutions from source

  • Limiting access

  • Monitoring of all data

  • Data encryption

  • Enforcing strong passwords

  • Training employees

  • Two factor authentication

  • Patch vulnerabilities

  • Encryption

  • Monitoring data

  • Strong passwords

  • Limit access

  • Two factor authentication

  • Limit access

  • Encrypt devices

  • Compliance

  • Individualistic handling breaches

  • Data protection

  • Cloud computing

Discussions from source

This speaks on data at two levels: Decision making and knowledge creation. It helps to get more understanding on the innovations to avoid data integrity threats.

The cloud as a revolutionary computing process, should be secured at all costs. The cloud is becoming more popular and more prone to attacks.

If data is closely looked at and monitored, it is possible to prevent breaches. It speaks on the causes of breach and how to go about it.

Data integrity breaches is not the end of the world. This article supports preparedness to recover from any data integrity breaches.

This article shows that protection of data from the main integrity breach possibilities will help to reduce the risks and severity of breaches.

There are many laws that handle data integrity and compliance with these laws can help with its security.

Data security is both a prevention and a cure of data integrity breach. However, it is important that continuity and recovery is achieved.

Conclusion

This source gets the main sources of threats to data integrity and finds that lack of preparedness or improvements to the methods of preventing data integrity has led to its corruption.

This source is full of information on cloud computing and proves why cloud computing needs protection and new ways of protection.

Monitoring of data and the cloud in real time can help in times of breaches. Lack of monitoring can lead to serious data loss.

Without data recovery, the company will be in deep trouble. Loss of data, especially sensitive data can lead to several legal issues.

It is almost impossible to prevent data breaches, but strategic decision making can reduce the severity, or the chances of a breach.

To comply with the laws on data integrity could help with getting better security and avoiding penalties from the breaches.

It is important to enforce the highest form of security when handling data. In case of any breach, recovery should be done promptly.