Cyber security, due primarily to globalization has become a profound issue. With the advent of the internet, new threats to privacy and security have arisen. For one, threats have caused data breaches and loss of service for many internet providers. Recently, American banks have become targets of cyber attacks from unknown sources. In many instances, it is difficult to detect the whereabouts of a cyber attack. The anonymity of an attack makes this threat particularly appealing to third world and developed nations. Due primarily to its ability to go undetected PII attacks have become very commonplace. PII, otherwise known as personally identifiable information, have a direct appeal to those who would like to do harm to developed countries. PII attacks are particularly profound as information including name, Social Security numbers and date of birth, stored in the vendor's database can be access by unauthorized user (Denning, 2008).
PII attacks are not unusual by any means. However, the concepts used to alleviate and rectify breaches have evolved over time. In many respects, preventive techniques must be adopted in a proactive fashion in order to circumvent the overall threat of PII attacks. As such the proactive nature of prevention constitutes constant innovation. Current procedures to help alleviate PII breaches are very simple and rely heavily on execution rather than strategy. For one, in order to reduce the threat of attack, the following three concepts should be adopted.
1. reducing the volume of collected and retained information to the minimum necessary;
2. limiting access of data to only those individuals who must have such access
3. Using encryption, strong authentication procedures, and other security controls to make...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now