Submit your final project topic (Data Breaches). Include a short paragraph describing your project and how you intend to research it. Submit a brief abstract describing your final project.

Running Head: DATA BREACHES 0

DATA BREACHES

Santhosh Manchikanti

Instructor: Surabhi Verma

New England College

Abstract

Currently, businesses of different sizes have grown to be more dependent on digital information, cloud computing plus ensuring the mobility of every worker in an organization. (Davis, 2019), notes that this reason has made data breaches to obtain a wide coverage compared to the previous years. However, a scientist by the name Oracle’s Mark illustrates data breach as a great issue for companies by considering enterprise risk view. Moreover, the different plus fluctuating threats enterprises encounter due to information breach might be destructive to revenue plus affect the image of a business and later be expensive to manage.

To make this project successful, design/methodology/approach Information connected with information breaches should be gathered from online resources, plus financial information associated with the breached organization gathered specifically from an online database. Financial variables to utilize should be associated with profitability, liquidity, plus organization size to ascertain the financial impact of breached organizations prior to and after information breach incidence. Non-financial information involving the form, plus the magnitude of breaches should again be gathered.

Despite the excessive number of researches done on preventing confidential data from being approached illegally, data breach continues to be an agile research problem. Businesses keep sensitive information on regular devices business databases plus cloud serves. Breaching any business information, an individual should have specialized techniques that can help to gain access to the stored information (Strawbridge, 2019). For instance, Privacy Rights Clearinghouse1 identified 901,010,077 data leakages from 2005, and just 5,220 information breaches were recognized. Furthermore, this paper assists readers to study the information leakages incidences, previous information breach scandals, and different ways of detection plus prevention of the breaches. It again intents to explain the factors associated with data breaches plus the root causes of the data breach incidences.

References for the Abstract:

Short Paragraph about Data Breaches:

A data breach, or data leakage, is a security incident where unauthorized viewers access or reveal protected data. A data breach is separate from data loss which occurs when data is no longer available due to hardware malfunction, deletion, or other cause. Protected data may include information about customers or employees, such as Personally Identifiable Information (PII), personal health information, payment card details, and social security numbers. This can also contain information on corporate or intellectual property (IP), such as trade secrets, specifics of the production process, manufacturer and consumer data, information on merger and acquisition, or data about lawsuits or other litigation.

How you intend to research it? (after answering this question please mention its references for this question at the bottom)


REFERENCES

(n.d.). Ponemon Institute. https://www.ponemon.org/

2020 data breach investigations report. (n.d.). Verizon Enterprise. https://enterprise.verizon.com/resources/reports/dbir/

Bomey, N., Dastagir, A. E., Shell, A., McCoy, K., & Yu, R. (2017, 09 15). Equifax data breach: What you need to know about hacking crisis. Retrieved 06 16, 2018, from USA Today: https://www.usatoday.com/story/money/2017/09/15/equifax-data-breach-what-you-need-know-hacking-crisis/670166001/

Data-breach

Davis, M., (2019). 4 Damaging After-Effects of a Data Breach - Cybint. Retrieved July 21, 2020, from https://www.cybintsolutions.com/4-damaging-after-effects-of-a-data-breach/

Joseph, G. (2015, 04 03). 7 Preventative Measures for Avoiding a Data Breach. Retrieved 06 16, 2018, from iprsecure: https://iprsecure.com/7-preventative-measures-for-avoiding-a-

Perlroth, N. (2016, 09 22). Yahoo Says Hackers Stole Data on 500 Million Users in 2014.

Retrieved 06 16, 2018, from TheNewyorkTimes: https://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html

Strawbridge, G., (2019). How Data Breaches Impact Company Valuations | MetaCompliance. Retrieved July 21, 2020, from https://www.metacompliance.com/blog/how-data-breaches-impact-company-valuations