100% (1)
Pages:
2 pages/≈550 words
Sources:
3
Style:
APA
Subject:
Accounting, Finance, SPSS
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 9.36
Topic:

Data Security and Breaches

Essay Instructions:
Watch this 12-minute description of the security breaches in history. https://www(dot)youtube(dot)com/watch?v=fulPBjNfYeg&ab_channel=AlphaPaw Watch this seven-minute review of constructing data security breach responses. https://www(dot)youtube(dot)com/watch?v=PhROeWMPBqU Read this three-page article titled Cybersecurity Resources for a Remote Workforce. https://www(dot)cpajournal(dot)com/2020/09/07/cybersecurity-resources-for-a-remote-workforce/ Read this 10-page article on Safeguarding the Internet of Things. https://www2(dot)deloitte(dot)com/us/en/insights/deloitte-review/issue-17/internet-of-things-data-security-and-privacy.html submit a response to these questions. 1. What was the largest hack in history? Why is this hack one of the harder to understand? (CLO 4) 2. Do VPNs protect home networks? If not, why not? (CLO 4) 3. How does blockchain currently affect concerns about a company’s data security and data security vigilance and data security resiliency? (CLO 4) 4. what have we learned?
Essay Sample Content Preview:
Data Security and Breaches Your Name Course and Section Professors Name November 17, 2024 1 What was the largest hack in history? Why is this hack one of the hardest to understand? (CLO 4) Yahoo was recently hit by the most significant security breach, in which over 1 billion user accounts were violated. This breach included email addresses, telephone numbers, passwords, and security questions. This is particularly so because the loss originates from data. Since the stolen data is specific to its provider, the implications are difficult to comprehend given the scale of the amounts involved. However, using state-sponsored actors makes things much worse because such actors are rather skilled in their actions, and goals are often mutually concealed. Research on such breaches is often challenging owing to their opaque nature and the perpetrator's political and geographical aspects. The Yahoo breach also shows how timely detection and response have an even worse impact. 2 Do VPNs protect home networks? If not, why not? (CLO 4) VPNs are among the most critical tools that protect data in transit since they encrypt it and hide the users' IP addresses. However, it does not mean that they safeguard home networks by default. Elements such as an aging router, simple passwords on Wi-Fi networks, malware, or infected devices are still threats when using a VPN. However, VPNs should be combined with other security measures at home, such as frequently updating software, using hard passwords, and having endpoint protection. On the same note, while using a VPN protects you from most threats, the users mus...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!