Annotated Bibliography on "Data Breach Highlights Corporate Security Risks"

Annotated Bibliography 4 pages (1639 words) Sources: 0

[EXCERPT] . . . .

Big Data Annotated Bibliography

Bjorhus, J. (2014). Clean Reviews Preceded Target's Data Breach, and Others. Retrieved from http://www.govtech.com/security/Clean-Reviews-Preceded-Targets-Data-Breach-and-Others.html

Bjorhus focuses on the issues surrounding Trustwave Holdings. The company faced security criticisms because of revealing customer information, a factor considered breach of compliance and security. The author reviews the reasons behind the reviews the company received in the past secondary to breaching confidentiality of the consumer information. The author reveals the weaknesses of the holding including flawed policy system for consumer related information, focusing on speed rather than quality, selling cheap audits to their clients and insecurity of the security systems that predispose companies to hacking of the systems and loss of valuable data. The article by this author is important for the study as it illuminates light into the challenges behind the success of the large companies involved in the storage of clients' information hence, the need for adoption of the big data.

Author's Note: Bjorhus is a business reporter and specialist in consumer finance and banking.

Claburn, T. (2013). Record-Setting Data Breach Highlights Corporate Security Risks. Retrieved from http://www.darkreading.com/vulnerabilities-and-threats/record-setting-data-breach-highlights-corporate-security-risks/d/d-id/1110930

Clabum (2013) focuses on one of the cases associated with stealing of more than 160 million credit card numbers. The article shows that global businesses have not adopted effective strategies aimed at p
Continue scrolling to

download full paper
rotecting their systems and client information against hackers. The author shows that lack of adequate security on client related information results to significant losses to businesses and the public. Apart from this, the author illuminates light into the economic impact of internet insecurity, which necessitates the adoption of strategies aiming at enhancing surveillance on the storage of business information. The article is important for the study as it shows the risks associated with adoption of inadequate strategies for ensuring security of information hence, the need for adoption of the big data.

Authors Note: Clabum is a renowned writer who focuses on technology and business related issues. He has written other articles such as New Architect, InformationWeek, and Salon among other publications.

Finkle, J. & Heavey, S. (2014). Target says it declined to act on early alert of cyber breach. Retrieved from http://www.reuters.com/article/2014/03/13/us-target-breach-idUSBREA2C14F20140313

Finkle and Heavey (2014) focuses on the malicious data breach identified by the Target Corp's security. Despite its identification, the staff failed to respond in a timely manner to the threat. The authors recognize that the failure to respond to the threat is attributable to the fact that they received numerous threats on a daily basis from the FireEye. The FireEye also does not give detailed information on the threat detected hence, the failure to respond to the threat. The fact that the article provides an estimate of the losses incurred from the threat forms the basis of the strengths of the article and its concern. The article is important as it provides insights into the need for the big data in preventing malware that affects the sustainability and safety of information from access by third parties.

Authors Note: Finkle is a photographer and journalists who write business articles. Heavey is a reporter, journalist and writer from Washington DC. She writes articles on business and finance related issues.

Harris, E.A. & Perlroth, N. (2014) Target missed signs of a data breach. Retrieved from: http://www.nytimes.com/2014/03/14/business/target-missed-signs-of-a-data-breach.html?referrer

Just like in the previous cases, this article focuses on the issues related with access of client information by a third party resulting to a significant loss to the Target Holdings. The hackers infiltrated their system and compromised approximately 40 million-customer information resulting into a loss of $61 million to the company. It is recognizable that similar to the earlier cases, the FireEye software detected the suspicious activity but there was no early initiation of response activities. The article is important for the study because it shows the nature of effects of loss of information of the company and the need for adoption of a more effective systems of data management than the earlier, hence suitability of the big data.

Authors Note: Harris is a reporter, journalists and writes business and finance related articles. She publishes articles with the New York Times and the Forbes among other publishing firms. Perlroth is a technology reporter working with the New York Times. She covers issues related to cyber security and privacy.

Jamieson, A. & McClam, E. (2013) Millions of Target customer's credit, debit card accounts may be hit by data breach. Retrieved from: http://www.nbcnews.com/#/business/consumer/millions-target-customers-credit-debit-card-accounts-may-be-hit-f2D11775203

The article shows the significant effects associated with breaching of the consumers' information such as that of the credit cards by a third party or hackers. It shows the ways in which the FireEye identified the malicious activity, but the involved authorities failed to execute the desired actions to eliminate the threat, as such, the article reveals the extent to which valuable information of the clients' credit cards and a significant loss of money through hacking occurred. The article proves important for the study as it stresses the need for the adoption of an effective security system that protects information against access by a third party such as in the case of the big data.

Author Note: Jamieson is a journalist, reporter, and a writer of the New York Times. He writes on business, finance, and cyber security related issues. McClam is also a reporter and writer for the New York Times and specializes in cyber-security related issues.

Kurane, S. (2014). Minnesota court to hear all Target data breach cases. Retrieved from http://www.reuters.com/article/idUSBREA3309J20140404?irpc=932

The article shows client dissatisfaction to the services provided by the Target Corp. The company failed in protecting the clients from data breach leading to significant loss of their valuable information. The 33 cases across 18 districts in the Minnesota signifies the nature of the inefficiency of the Target Corp in providing security of information of the customers from access by a third party. The article is important as it shows the extent and the consequences of failing to protect information of the consumers. As such, the article shows the need for the adoption of the big data in such companies.

Authors Note: Kurane is a reporter and writer for the New York Times and specializes in the monitoring of information related to cyber threats and security across the U.S. alongside writing on issues affecting business of the state.

Mitchell, S. (2009). How to Survive a Data Breach a Pocket Guide. Cambridgeshire, UK: IT Governance Publishers.

Mitchell recognizes the fact that data breach costs significant losses to most organization hence, the need for adoption of effective strategies to respond and prevent incidences of data breach across different organizations. The author draws empirical evidences from the past cases of breach of information and loss of data to come up with an effective strategy for preventing data loss through hacking. The fact that the author uses surveys and analysis of past events to provide ways of preventing data loss forms the strength of the guide. The guide is important for the study as it provides valuable information used in the study to develop preventive strategies against breach of data.

Authors Note: Mitchell is a renowned IT journalist working across different publications that include Sunday Times, PC Pro, and Computer Shopper.

Rosenbaum, P. (2014) The Target data breach is becoming a nightmare. Retrieved from: http://www.forbes.com/sites/paularosenbaum/2014/01/17/the-target-data-breach-is-becoming-a-nightmare/

Rosenbaum discusses ways in which data breach has become one of the most critical issues facing businesses in the modern business environment. The author notes that most of the breach of data has occurred through the loss of credit card information and other users related information such as email phone numbers of the consumers. The ways in which the loss of data as stated in the article forms the basis of its strengths. Among the systems targeted by the hackers, include the POS system that stores Visa related information. The article is important… READ MORE

Quoted Instructions for "Data Breach Highlights Corporate Security Risks" Assignment:

Please complete Annotated Bibliography for the following ten (10) references, please see instructions and examples, attached:

1. Bjorhus, J. (2014). Clean Reviews Preceded Target*****s Data Breach, and Others. Retrieved from http://www.govtech.com/security/Clean-Reviews-Preceded-Targets-Data-Breach-and-Others.html

2. Claburn, T. (2013). Record-Setting Data Breach Highlights Corporate Security Risks. Retrieved from http://www.darkreading.com/vulnerabilities-and-threats/record-setting-data-breach-highlights-corporate-security-risks/d/d-id/1110930

3. Finkle, J. & Heavey, S. (2014). Target says it declined to act on early alert of cyber breach. Retrieved from http://www.reuters.com/article/2014/03/13/us-target-breach-idUSBREA2C14F20140313

4. Harris, E. A. & Perlroth, N. (2014) Target missed signs of a data breach. Retrieved from: http://www.nytimes.com/2014/03/14/business/target-missed-signs-of-a-data-breach.html?referrer

5. Jamieson, A. & McClam, E. (2013) Millions of Target customer*****s credit, debit card accounts may be hit by data breach. Retrieved from: http://www.nbcnews.com/#/business/consumer/millions-target-customers-credit-debit-card-accounts-may-be-hit-f2D117752036.

6. Kurane, S. (2014). Minnesota court to hear all Target data breach cases. Retrieved from http://www.reuters.com/article/idUSBREA3309J20140404?irpc=932

7. Mitchell, S. (2009). How to Survive a Data Breach a Pocket Guide. Cambridgeshire, UK: IT Governance Publishers.

8. Rosenbaum, P. (2014) The Target data breach is becoming a nightmare. Retrieved from: http://www.forbes.com/sites/paularosenbaum/2014/01/17/the-target-data-breach-is-becoming-a-nightmare/

9. Saikali, A. (2013, December 30). The Target Data Breach Lawsuits: Why every Company Should Care. Data Security Law Journal. Retrieved from: http://www.datasecuritylawjournal.com/2013/12/30/the-target-data-breach-lawsuits-why-every-company-should-care/

10. Thompson, L. L. (2011). Data Breach Encryption Handbook. Chicago, IL: American Bar Association.

Thank you.

*****

*****

How to Reference "Data Breach Highlights Corporate Security Risks" Annotated Bibliography in a Bibliography

Data Breach Highlights Corporate Security Risks.” A1-TermPaper.com, 2014, https://www.a1-termpaper.com/topics/essay/big-data-annotated-bibliography/4278242. Accessed 3 Jul 2024.

Data Breach Highlights Corporate Security Risks (2014). Retrieved from https://www.a1-termpaper.com/topics/essay/big-data-annotated-bibliography/4278242
A1-TermPaper.com. (2014). Data Breach Highlights Corporate Security Risks. [online] Available at: https://www.a1-termpaper.com/topics/essay/big-data-annotated-bibliography/4278242 [Accessed 3 Jul, 2024].
”Data Breach Highlights Corporate Security Risks” 2014. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/big-data-annotated-bibliography/4278242.
”Data Breach Highlights Corporate Security Risks” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/big-data-annotated-bibliography/4278242.
[1] ”Data Breach Highlights Corporate Security Risks”, A1-TermPaper.com, 2014. [Online]. Available: https://www.a1-termpaper.com/topics/essay/big-data-annotated-bibliography/4278242. [Accessed: 3-Jul-2024].
1. Data Breach Highlights Corporate Security Risks [Internet]. A1-TermPaper.com. 2014 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/big-data-annotated-bibliography/4278242
1. Data Breach Highlights Corporate Security Risks. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/big-data-annotated-bibliography/4278242. Published 2014. Accessed July 3, 2024.

Related Papers:

Data Breach Case Study

Paper Icon

Twitter Breach

As technology and humans continue to learn how to act with one another, many valuable lessons can be learned from this process. Today, the internet and the rapid… read more

Case Study 3 pages (734 words) Sources: 3 Topic: Computers / IT / Internet


Identity Management and Security Awareness Training Plan Corporate Writing

Paper Icon

Identity Management and Security Awareness Training Plan

The entire human race is in a constant phase of experiencing technological innovations and advancements, since the globe has crossed the threshold of… read more

Corporate Writing 6 pages (1839 words) Sources: 0 Topic: Computers / IT / Internet


Security - Agip Kazakhstan North Caspian Operating Term Paper

Paper Icon

Security - Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO)

Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO) is the single operator of the North Caspian Sea Production… read more

Term Paper 35 pages (14948 words) Sources: 1+ Topic: Business / Corporations / E-commerce


Security Policy Dr. Fossett's Dental Office Term Paper

Paper Icon

Security Policy of a Dental Office

Information Technology Security for XYZ's Dental Office will be achieved by implementing these controls, policies, procedures and standards. This approved Security policy reflects the… read more

Term Paper 3 pages (1254 words) Sources: 0 Topic: Computers / IT / Internet


Computer Security Research Paper

Paper Icon

Computer Security

Information Warfare (IW) is one of the latest forms of threats that poses great security risk to the national peace and order in the U.S. In this paper… read more

Research Paper 20 pages (5531 words) Sources: 25 Topic: Military / Army / Navy / Marines


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!