Four Domains Of Vulnerabilities That Cause Information And Information Security Breach Case Study

734 Words2 Pages

There are four domains of vulnerabilities that may cause information/data security breaches. Information Security Governance, People, Processes and Technology are it. Hacking, stealing and copying information are the examples of breaches that takes place at times.
According to the information security governance, success is often less, due to inability to value the the organisation 's information and data. This creates the discussion on the needs for security and the resources to be assigned to this.
In 2009, a federal grand jury jailed Albert Gonzalez and two unnamed Russian accomplices for allegedly hacking into systems and stealing individual 's credit and debit cards. Gonzalez was then sentenced to 20 years in federal prison in March, 2010. 94 million credit cards were exposed because of this incident.
Another breach that took pace was the Veteran’s Administration incident which 26.5 million discharged veterans’ records, including their name, SSN and state of birth were stolen from the home of an employee who accidently too the materials home. An additional breach that occurred was when Photocopiers that were used to copy sensitive medical information were sent to be re-sold without wiping at all the hard drives and the data was later on discovered in the warehouse storing the copiers. …show more content…

They should also be able to learn to select and adopt standards, good practices and guidelines. Building awareness of information security issues among the workforce and service providers are good pointers the e-business community could consider doing. They could also learn the impact of security events on business process and the organisation as a whole. They can learn to always keep asking themselves the three questions of Are you doing the right things?, Are you doing them the right way?. And Are you doing them well enough? And if no, what are you going to do about

More about Four Domains Of Vulnerabilities That Cause Information And Information Security Breach Case Study

Open Document