Verified Document

Understanding Information Security Investigations Essay

Lessons From Target Data Breach There are several lessons learnt from this case. First, I have learnt that the experience of Target on its data breach continues to jeopardize the confidentiality of stored information and the market value of the firm. Therefore, the company deserves to invest much attention, especially in research. Worry of disclosure of credit card information, private details, and other IDs is often the reason why customers leave companies. After identification of breach, Target Company is compelled to pay court costs, charges and has to get into enhancing its data security. The traders lose assurance in the company and the eventual fall in market value. Many studies have been performed to assess the speculation as further explored in this study (Bayuk, 2010). The primary objective of this document is to evaluate the chance of forecast of a Target data violation and assess its effect on industry value based on the outcomes of recent reports and research of representative cases (Grove, 2010).

Domain

Secondly,...

While providing a high-level of security to protect the data while also protecting the owner of the data can be challenging, it is worth the cost. This study explores relevant lessons acquired from Target data breach (Peitz & Waldfogel, 2012).
Research problem

Interestingly, nearly all the conducted studies contain the same concept that present Target data breaches have more serious effect than the historical ones. Although the real outcomes of research are not exactly the same, there is a damaging effect of the company's data breaches. Third, I have also learnt that the fall in market value happens once the disclosure of information is violated. This document is only the preliminary attempt to lay the fundamentals for the following research targeted on lessons learnt from the incident. Latest reports of…

Sources used in this document:
References

Bayuk, J.L. (2010). CyberForensics: Understanding information security investigations. New York: Humana Press.

Grove, R.F. (2010). Web-based application development. Sudbury, Mass: Jones and Bartlett Publishers.

Peitz, M., & Waldfogel, J. (2012). The Oxford handbook of the digital economy. New York: Oxford University Press.

Infosecurity 2008 threat analysis: Your one-stop reference containing the most read topics in the infosecurity security library. (2008). Burlington, Mass: Syngress
Cite this Document:
Copy Bibliography Citation

Related Documents

IT Strategy for Information Security
Words: 2253 Length: 7 Document Type:

Information Security Strategy The world of information technology (IT) has evolved tremendously in the last few decades. Today, IT systems permeate virtually every aspect of work in the organizational setting – from strategic planning functions to administrative and operational functions such as human resource management, payroll management, project management, procurement, customer relationship management, and financial management. These systems have enabled organizations undertake a wide variety of tasks with far greater ease,

The Chief Information Security Officer CISO
Words: 2489 Length: 7 Document Type: Term Paper

Information Technology Security Roles Abstract The roles that information security personnel play is vital within an organization. We have analyzed three key roles namely CISO, CIO, and Digital forensics. These are key roles in an organization that wants to secure its information systems and data. Each role has been analyzed and the different function performed within each role presented. This gives a clear picture of what each role performs and what is

Understanding the Core Challenges to
Words: 3326 Length: 10 Document Type: Essay

This springs from the inherent flaw to the logical and practical underpinnings of the 2001 bill. Its twofold set of assumptions-that safety can only be preserved through the sacrifice of personal liberties and that terrorism is the product of bureaucratic obstacles to law-enforcement-both proceed from a faulty ideological seedling that far predates 9/11. In its forceful attainment of new authorities which have even further removed it from the province of democratic process, the United States government

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Big Data Annotated Bibliography
Words: 1473 Length: 4 Document Type: Annotated Bibliography

Zaslavsky is the leader of the Semantic Data Management Science Area (SMSA). He has published more than 300 publications on science and technology. Perera has vast experience in computing and technology as he is a member of the Commonwealth Scientific and Industrial Research Organization alongside publishing numerous journals. Georgakopoulos is the Director of Information Engineering Laboratory. He has published over 100 journals on issues related to science and technology

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now