Verified Document

Understanding Information Security Investigations Essay

Lessons From Target Data Breach There are several lessons learnt from this case. First, I have learnt that the experience of Target on its data breach continues to jeopardize the confidentiality of stored information and the market value of the firm. Therefore, the company deserves to invest much attention, especially in research. Worry of disclosure of credit card information, private details, and other IDs is often the reason why customers leave companies. After identification of breach, Target Company is compelled to pay court costs, charges and has to get into enhancing its data security. The traders lose assurance in the company and the eventual fall in market value. Many studies have been performed to assess the speculation as further explored in this study (Bayuk, 2010). The primary objective of this document is to evaluate the chance of forecast of a Target data violation and assess its effect on industry value based on the outcomes of recent reports and research of representative cases (Grove, 2010).

Domain

Secondly,...

While providing a high-level of security to protect the data while also protecting the owner of the data can be challenging, it is worth the cost. This study explores relevant lessons acquired from Target data breach (Peitz & Waldfogel, 2012).
Research problem

Interestingly, nearly all the conducted studies contain the same concept that present Target data breaches have more serious effect than the historical ones. Although the real outcomes of research are not exactly the same, there is a damaging effect of the company's data breaches. Third, I have also learnt that the fall in market value happens once the disclosure of information is violated. This document is only the preliminary attempt to lay the fundamentals for the following research targeted on lessons learnt from the incident. Latest reports of…

Sources used in this document:
References

Bayuk, J.L. (2010). CyberForensics: Understanding information security investigations. New York: Humana Press.

Grove, R.F. (2010). Web-based application development. Sudbury, Mass: Jones and Bartlett Publishers.

Peitz, M., & Waldfogel, J. (2012). The Oxford handbook of the digital economy. New York: Oxford University Press.

Infosecurity 2008 threat analysis: Your one-stop reference containing the most read topics in the infosecurity security library. (2008). Burlington, Mass: Syngress
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now