About Expert


Key Topics
Compare Different Threats and Vulnerabilities
Submit, individually, the different kinds of data breaches, the threats and vulnerabilities that lead to the breaches, and the severity of each.
Choose any format to present. Some guidelines are:
APA formatted paper (2 to 3 pages)
Mentioned below are the various types of data breaches, the associated threats and vulnerabilities that lead to these kinds of breaches, and the severity of each of these:
The physical breach is said to occur when someone physically steals the documents from the computers or other electronic items where the data of the person who possessed that item is present. The data theft can have serious implication on the owner of the equipment as the thieves can use the personally identifiable information to threat somebody or can use any account data to access the balance in the banks (Baker et al, 2011). The reason for such data breach is the lack of proper care of the physical items and allowing anyone using the equipment without any prior measures. The most suitable ways to stay from such data breaches are to keeping a proper track of the equipment possessed by the owner and keeping an eye on the technologies from where the account data can be accessed by anyone. Moreover, other types of physical elements such as hardcopy of the card receipts and other similar documents should be destroyed or kept secret from the prying eyes.
The electronic data breach is conducted by the expert hackers who have fair idea or online methods of hacking the computer or other electronic devices of the users. They intentionally enter into the users’ system to steal the information of the users’ bank or card data. This kind of threat is less severe if the user is using strong system security. However, if the user is careless about the online security then the user might not know when the data has been taken out of the system (Baker et al, 2011). The vulnerability level increases exponentially if the user involves more in online transactions and care less about data protection such as not using only https sites for the transaction or clicking on any link in the mail that seems to be taking the user to the bank website. The hackers can use various methods such as coding, or phishing to steal the information.
The skimming data breach is where the magnetic stripe of the users’ card are captured illegally to create clone or counterfeit cards which can be used later to access the cash or for any online transaction without the knowledge of the user. If the users does not closely monitor the activities around their card such as when they involve in paying bills at Point of Sales at retail stores, or allowing unauthorized person to use their card for any payment at various kiosks such as at gas stations and others (Romanosky et al, 2011). The level of vulnerability is severe as the users get aware about the theft only after they see deducted amount from the bank account which is very demotivating. The users need to take care of the way they transact the amount using their card and do not hand over their card to anyone in the lobby.
Baker, W. H., Hylender, A., Pamula, C. D., Porter, J., & Spitler, C. (2011). M," 2011 data breach investigations report,". Verizon RISK Team, Available: www. verizonbusiness. com/resources/reports/rp_databreach-investigationsreport-2011_en_xg. pdf, 1-72.
Romanosky, S., Telang, R., & Acquisti, A. (2011). Do data breach disclosure laws reduce identity theft?. Journal of Policy Analysis and Management, 30(2), 256-286.