Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(247.22KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Dealing with Data Breaches Amidst Changes In Technology
Fuad S Alharbi
Pages - 108 - 114     |    Revised - 31-07-2020     |    Published - 31-08-2020
Volume - 14   Issue - 3    |    Publication Date - August 2020  Table of Contents
MORE INFORMATION
KEYWORDS
Data Breach, Cybersecurity, Technical Practices, Organizational Practices.
ABSTRACT
In the future, it is expected that the industry will be marked with multiple technologies. These technologies will play a crucial role in the improvement of the levels of efficiency that companies exhibit. On the other hand, one of the major weaknesses that will likely arise is a threat to the privacy, integrity, and security of data (Sloane, 2018). Through the use of various technologies such as the internet of things, companies will find it hard to protect their data against breaches (Griffy-Brown, Lazarikos & Chun, 2019). Data breaches will be based on the use of the latest technologies to exploit weaknesses found in the various systems. It is, therefore, recommended that companies must adopt a holistic approach in the development of protective, preventive, and reliable mechanisms of ensuring and guaranteeing information security and reduce the risks of data breaches (Ghosh, Mishra & Mishra, 2019). However, with the current trends, it is expected that more breaches will continue to happen, ranging from the use of phishing, hacking, malware, and also but not limited to ransomware.
1 Bell, T. (2018). Adobe's CSO talks security, the 2013 breach, and how he sets priorities. CSO.
2 Bendovschi, A. (2015). Cyber-attacks- Trends, Patterns and Security Countermeasures. Procedia Economics and Finance, 28, 24-31. doi: 10.1016/S2212-5671(15)01077-1
3 Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. In 2012 International Conference on Computer Science and Electronics Engineering (Vol. 1, pp. 647-651). IEEE.
4 Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1211.
5 Cisco . (2020). What Is a Firewall?
6 Isaac, M., & Frenkel, S. (2018). Facebook Security Breach Exposes Accounts of 50 Million Users. New York Times .
7 Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993.
8 Kong, W., Lei, Y., & Ma, J. (2018). Data security and privacy information challenges in cloud computing. International Journal of Computational Science and Engineering, 16(3), 215-218.
9 Liao, H. J., Lin, C. H., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.
10 Lykou, G., Anagnostopoulou, A., & Gritzalis, D. (2018). Implementing cyber-security measures in airports to improve cyber-resilience. In 2018 Global Internet of Things Summit (GIoTS) (pp. 1-6). IEEE.
11 Marcus, D. J. (2018). The Data Breach Dilemma: Proactive Solutions for Protecting Consumers' Personal Information. Duke LJ, 68, 555.
12 Reuters. (2014). Hackers raid eBay in historic breach, access 145M records. CNBC.
13 Seemma, P., & Sowmiya, M. (2018). Overview of Cyber Security. International Journal of Advanced Research in Computer and Communication Engineering, 7(11), 125-128. doi:10.17148/IJARCCE.2018.71127
14 Srinivasan, S. (2015). Privacy Protection and Data Breaches., (pp. 429-444). Houston. Retrieved from https://pdfs.semanticscholar.org/0675/bbd99274c5410c6c466e851096ff092d88b1.pdf
15 Thakur, K., Qiu, M., Gai, K., & Ali, M. L. (2015). An investigation on cyber security threats and security models. In 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (pp. 307-311). IEEE.
16 Valuch, J., Gabris, T., & Hamulak, O. (2017). Cyber Attacks, Information Attacks, and Postmodern Warfare. Baltic Journal of Law and Politics, 10(1), 63-89. doi:10.1515/bjlp-2017-0003
17 Weise, E. (2016). 360 million Myspace accounts breached. USA TODAY.
Mr. Fuad S Alharbi
Cybersecurity Department, Marymount University, Arlington, 22201 - United States of America
fuadgmc@gmail.com