Digital Skills For The 21st Century- IT 200

Requirement

Compare Different Threats and Vulnerabilities

Submit, individually, the different kinds of data breaches, the threats and vulnerabilities that lead to the breaches, and the severity of each.

Choose any format to present. Some guidelines are:

APA formatted paper (2 to 3 pages)

Solution

Different Threats and Vulnerabilities

Mentioned below are the various types of data breaches, the associated threats and vulnerabilities that lead to these kinds of breaches, and the severity of each of these:

Physical Form of Data Breach

The physical breach is said to occur when someone physically steals the documents from the computers or other electronic items where the data of the person who possessed that item is present. The data theft can have serious implication on the owner of the equipment as the thieves can use the personally identifiable information to threat somebody or can use any account data to access the balance in the banks (Baker et al, 2011). The reason for such data breach is the lack of proper care of the physical items and allowing anyone using the equipment without any prior measures. The most suitable ways to stay from such data breaches are to keeping a proper track of the equipment possessed by the owner and keeping an eye on the technologies from where the account data can be accessed by anyone. Moreover, other types of physical elements such as hardcopy of the card receipts and other similar documents should be destroyed or kept secret from the prying eyes.

Writing Assignment and completing it on time is not an easy job. If you forget to write your assignment you can take IT management assignment help from Allassignmenthelp.com. We are a team of professional assignment writers who are talented enough to deliver a plagiarism-free assignment within the given frame. On our website, the students can get information technology assignment help at a very affordable price.

Electronic Data Breach

The electronic data breach is conducted by the expert hackers who have fair idea or online methods of hacking the computer or other electronic devices of the users. They intentionally enter into the users’ system to steal the information of the users’ bank or card data. This kind of threat is less severe if the user is using strong system security. However, if the user is careless about the online security then the user might not know when the data has been taken out of the system (Baker et al, 2011). The vulnerability level increases exponentially if the user involves more in online transactions and care less about data protection such as not using only https sites for the transaction or clicking on any link in the mail that seems to be taking the user to the bank website. The hackers can use various methods such as coding, or phishing to steal the information.

Skimming Data Breach

The skimming data breach is where the magnetic stripe of the users’ card are captured illegally to create clone or counterfeit cards which can be used later to access the cash or for any online transaction without the knowledge of the user. If the users does not closely monitor the activities around their card such as when they involve in paying bills at Point of Sales at retail stores, or allowing unauthorized person to use their card for any payment at various kiosks such as at gas stations and others (Romanosky et al, 2011). The level of vulnerability is severe as the users get aware about the theft only after they see deducted amount from the bank account which is very demotivating. The users need to take care of the way they transact the amount using their card and do not hand over their card to anyone in the lobby.

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

References

  • Baker, W. H., Hylender, A., Pamula, C. D., Porter, J., & Spitler, C. (2011). M," 2011 data breach investigations report,". Verizon RISK Team, Available: www. verizonbusiness. com/resources/reports/rp_databreach-investigationsreport-2011_en_xg. pdf, 1-72.

  • Romanosky, S., Telang, R., & Acquisti, A. (2011). Do data breach disclosure laws reduce identity theft?. Journal of Policy Analysis and Management, 30(2), 256-286.

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order