Privacy And Data Breach Essay

Improved Essays
Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data. Technology in the twenty first century …show more content…
This means that individuals could have been affected by more than one breach exposing sensitive information. My data analysis showed organizations have indicated a low and high numbers of total data breached from year-to-year such as Businesses-Other (BSO) organization. From 2012 – 2016, finding shows that BSO organization has the largest rate and most damaging data breached among all organizations and does not include other breaches that did not report the total records of breaches. The result of this data shows in my line chart that BSO organization chart pattern indicated a low to a sudden large increased data breached from 2012 and as the year …show more content…
From 2012 -2016, Businesses – Other (BSO) industry has a total of 85% data records affected compared to any other organizations. Businesses - Retail/Merchant (BSR) were at 5%, Government (GOV) at 2%, Medical (MED) at 1%, Businesses - Financial/Insurance Services (BSF) at 7% and Education (EDU) and Non-profit (NGO) organization reveals at 0%. Even though, Education and Non-profit organization resulted at 0% that doesn’t mean that these two organizations had been spared from data breaches. Their overall data records breached were 4,207,097 and 312,462 respectively. The result was very much lower that the average were only in the range of 62,492 to 841,419 compared to other organization’s million average of data records being breached in the last five years.
I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues

Related Documents

  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Avmed: Forensic Analysis

    • 294 Words
    • 2 Pages

    In December of 2009 a company named AvMed, which is a Florida based not-for-profit health plan provider, had two laptops stolen (Anderson,2010; “We help our members”, n.d.). One of the laptops was recovered and it contained encrypted patient information. However, the second laptop was not encrypted and it contained names, Social Security numbers, addresses, birthdays and other healthcare information. Initial reports indicated a little over two hundred thousand clients were impacted, but a forensic analysis by Price Waterhouse Coopers revealed that the scope of the data breach may involve 1.2 million customers.…

    • 294 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    According to a report by USA Today’s Elizabeth Weise, an astounding 43% of businesses had been hacked in 2014 and they don’t seem to be slowing down (Weise, 2014). It is important to expand further on the Target store breach of 2013.…

    • 946 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The HIPPA Privacy Rule Are medical records really private and is there a difference between the Health Insurance Portability and Accountability Act (HIPPA) and the Privacy Rule? In essence, the two are the same. However, the main difference is that the HIPPA Act, enacted in 1996, was not signed into legislation after the Department of Health and Human Services (DHHS) applied pressure to enforce the privacy issues within the medical field (Bethel University, 2015). Since legislation did not pass this law after the three-year time limit, in 2003, DHHS then broadcasted a specific set of rules concerning the use and disclosure of medical records, requiring health care providers to comply. In premise, the HIPPA act is nothing more than a disclosure…

    • 827 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    CSE 543: Individual Report

    • 1293 Words
    • 6 Pages

    We have done detail analysis of each and every entity in our report. The defense against attacks can occur only when the attack is known so that preventive measures can be put into motion. We have involved all the countermeasures White hat can use to prevent attack against Black hat. Recent anthem data breach affected 80 million individuals received multi-day coverage, sending shockwaves through the nervous public. This breach highlights the growing threat healthcare industry is facing.…

    • 1293 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It 1. Who are the stakeholders in the Target breach? The main stakeholders are their shareholders, the clients that had their personal information stolen, and individuals with an ongoing connection with Target organization whose personal information was or might have been compromised. Stakeholders who are affected or worried that they might be harmed start to mistrust the firm and its complacent-sounding promises.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction According to http://searchsecurity.techtarget.com/definition/data-breach , “A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.” Many people experienced a data breach if they shopped in Target stores between November 27 and December 15, 2013. According to Washington Post, more than 70 million customers not only might have had their personal information compromised but also their card data stolen.…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Data breaching is the act of confidential information being releasing intentional or unintentional (Beal, n.d.). The ultimate goal of hackers when performing data breaches is to gain complete access to fully secured database or repository. Majority of data breaches occur within digital data conducted over a network with connection, like the Internet. It very common for company’s such as department stores to be vulnerable to these attacks due to the amounts of data that is stored within their systems. When these attacks on data occur many customers to companies experience a betrayal of trust within the company (Trend Micro).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Security Breaching

    • 1830 Words
    • 8 Pages

    Have you ever been hacked? Not in the “Haha I took a funny picture on your account hacked,” but the scary moment when you realize your passwords have been changed and you can’t access your bank account anymore? If you haven’t, count yourself lucky, because Security Researchers state that almost half of the population of the United States has been hacked, or have had their private information leaked to the web. Many times you don’t even know it’s happened. Companies don’t like sharing information about breaches with the public, as it sheds “bad” light on them.…

    • 1830 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Conformity Bias

    • 1015 Words
    • 5 Pages

    How times have changed as technologies, have evolved, so too have the tools that cyber attackers use to hack into businesses to access personal information. Fraud has always existed and has hardly changed, only the disguises it uses. In today’s world people, have been taught to push and strive for more and to continue to push for more. This new way of thinking has quickly developed into something uncontrollable. It has caused a new stream of fraud to emerge for it has created higher levels of greed, new methods to detection, as well as new ways to prevention.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Surveillance has presented numerous challenges to the right of privacy. There is a need to develop a high technology surveillance system that will come with great benefits without intrusion. With new advances in technology each day, it is becoming easier to communicate with each other. Yet with all these new forms of communication there have been unpleasant side effects, since this new advanced technology is not only for harmless interactions between one another it is also used to plot against governments and countries. Governments have found themselves under attack a countless number of times and have had no other choice but to resort to monitoring their citizen’s online and phone activities.…

    • 729 Words
    • 3 Pages
    Improved Essays