Home » Downloads » Data security breach is the process with which the unauthorized people get access to the organizational information

Data security breach is the process with which the unauthorized people get access to the organizational information

Data security breach is the process with which the unauthorized people get access to the organizational information

Data security breach is the process with which the unauthorized people get access to the organizational information with no authority from the users. The incident is a security threat because it deals with data of the organization (Kizza, J. M. (2014). There several types of the security threats an each one of them do course a big problem to the companies. In this case we are looking at the security threat that comes in form of messaging.

The messing comes in different forms but most of them do come in the form of the emailing of the information. In this case the sender expects the organizational management to receive the messaging and open it so that by doing that it becomes a gate pass to the organizational data. This has become the biggest threat to companies since the companies do expect emails from various customers but hackers take advantage of that.

The process is occurs when the data is sent with unique viruses whereby ones the company accept the message then the virus is fully transferred to the organizational system and in that system they affect the operational system. As a company some of the measures need to be taken that can detect the kind of the information that have been sent to the organization (Nass, S. J., Levit, L. A., Gostin, L. O., & Institute of Medicine (U.S.). (2009). Another method is to ensure that employees of the organization are trained and they know the kind of the information to accept an the ones to decline for security matters. Keeping safety in the company is a collective responsibility of the company. Every employee has a duty to ensure that data is safe. Besides that the company needs to implement the use of firewalls.

References

Kizza, J. M. (2014). Computer network security and cyber ethics.

Nass, S. J., Levit, L. A., Gostin, L. O., & Institute of Medicine (U.S.). (2009). Beyond the HIPAA privacy rule: Enhancing privacy, improving health through research. Washington, D.C: National Academies Press.

A valid and reliable form of communication is the essential thing in ensuring the success of a business or an organization. One of the most preferred ways of communication is instant messaging since it is faster, reliable, and convenient. Instant messaging is a real-time based mode of communication that is quite similar to chat. It uses a shared software client between or among two or more people using personal computers, iPhones, and other communication devices. However, being the most preferred mode of communication in a corporate environment, it can cause data/security breach of it is misused (Cheng, Liu, & Yao, 2017). Data/security breach is the manipulation of a security system or information by hackers who gain illegal access to the computer system. The following discussion describes a case of data/security breach caused by misuse of instant messaging in the corporate environment.

Data or security data can be caused by using a recognized set of APIs; developers can write applications that interface with the MSN Messenger and ICQ clients (Tanrıkulu, Altun, Baker, & Goner, 2015). The APIs expose the functionality of instant messaging that is strong sufficient to generate instant messaging worms (Zhou, 2015). Such kinds of breaches can be prevented by developers whereby they will create applications that don’t interface with the MSN messenger to avoid exposing the credentials of the user.

In conclusion, instant messaging is considered secure when a specialized form of instant messaging that along with other variances, encrypts and decrypts the contents of the message in a way that only the real user is the one who can understand them. Instant messaging mostly is attacked by data leakage, firewall tunneling, and authentication spoofing.

References

Cheng, L., Liu, F., & Yao, D. D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery7(5).

Tanrıkulu, İ., Altun, S. A., Baker, Ö. E., & Goner, O. Y. (2015). Misuse of ICTs among Turkish children and youth: A study on newspaper reports. Journal of Human Sciences12(1), 1230-1243.

Zhou, T. (2015). The effect of network externality on mobile social network site continuance. Program49(3), 289-304.

Responses with references for this two posts please

Answer preview to data security breach is the process with which the unauthorized people get access to the organizational information

Data security breach is the process with which the unauthorized people get access to the organizational information
APA

224 words

Get instant access to the full solution from yourhomeworksolutions by clicking the purchase button below

Accounting

Applied Sciences

Article Writing

Astronomy

Biology

Business

Calculus

Chemistry

Communications

Computer Science

Counselling

Criminology

Economics

Education

Engineering

English

Environmental

Ethics

Film

Food and Nutrition

Geography

Healthcare

History and Government

Human Resource Managment

Information Systems

Law

Literature

Management

Marketing

Mathematics

Nursing

Philosophy

Physics

Political Science

Psychology

Religion

Sociology

Statistics

Writing

Terms of service

Contact