Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
The Effects of Data Breaches on Costs and Sales, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
User credential related risk
VPNs avail multi-level access to the internet as well as the internal resources within the corporate network. However, some of the procedures that are employed to authenticate the devices and users at the remote end of the connection are more robust that its security. Two factor authentication is critical for the enhancement of security in such networks.
Integrity of the Internal Remote Network
Remote computer access is normally a major threat vector to the network security of the company. The remote computers may forward a potential infection to the corporates internal network from its local network environment. Worms, viruses and Trojans can infiltrate the network from a remote computer.
Public Computers’ Host Security Software
A corporate internet network can be accessed by use of Secure Sockets Layer and Virtual Private Network. However, the local computer may lack antivirus software properly installed hence they may spread worms, Trojans horses, viruses, and may create a potential weakness, back door for malicious attackers. Network virtualization is the process of combining software and hardware network resources and network usage into one software-based administrative entity called a virtual network. Network virtualization includes platform virtualization and resource virtualization.
Network virtualization can either be internal or external. External network virtualization combines several networks or portions of networks into a virtual unit, while internal network virtualization provides network-like capabilities to the software containers on a specific system. Network virtualization is one of the main building blocks of multi-tenant cloud hosting. Network virtualization technology compliments server hypervisors by allowing seamless workload mobility regardless of the underlying protocol choices and network addressing.
Keystroke loggers
When public computers are used, SSL VPN client terminals are potentially more susceptible to keystroke loggers since they may fail to meet the organization’s security standards and policies.
Man in the middle attacks
This type of attacks entail traffic interception by an attacker, accessing credentials and any other critical information. This information may be used by the attacker to access the real destination network. The attacker who serves as a malicious proxy/gateway presenting a false SSL VPN site to the user is passed the authentication to be used to access the actual destination site. These possess a security risk to the organization.
Intellectual Property and Sensitive Information Loss (End Points)
Sensitive information ranging from user credentials, customer information, and internal personnel information can be retrieved from an inadequately protected computer system. This requires endpoint type of protection to limit this type of risk.
In the event that a data breach event takes place, an organization incurs huge liability costs as a result of the breach. These liability costs include:
Exposure of clientele information that may lead to law suits from the clientele. Such law suits have huge financial implications on the company as it is pivotal and mandatory that organizations protect clients’ information.
Leakage of the organizations sensitive information pertaining to finances and operational procedures. This may lead to the organization losing the competitive advantage in the market as competition would develop strategies to counter any strategies the organization had put in place.
A data breach may lead to the organization facing further risk of theft. (De Marco, Te’eni and Albano) This is because when sensitive information on an organizations assets and their positions is leaked, in the wrong hands, this information can lead to theft of such assets as bank balances from the organization’s bank account.
A data breach may lead to an organization losing face in the market and reducing their competitiveness. This is because clients and suppliers do not wish to deal with business entities whose information security is questionable (Kim and Solomon). This leads to the organization losing clientele and suppliers, leading to considerable financial loss.
IT System | Target System | Connection Type | Possible Security Vulnerability | Related Risk |
EXAMPLE
HR System |
Identity Management System | Feeder File | File could be modified. | User rights might not be correctly updated. |
CRM system | 1.Identity management system
2. Marketing management system |
1. T1 Connection | 1.hacked from the inside
2. |
1.Unauthorized user access to confidential information
2.Loss of information by theft 3.unathorized editing of information 4. |
Finance system | Directory Control | Common Database | Unsecured domain control | breach of the firewall |
IT Support systems | IT management | SAP solution manager | SAP inaccessible | Cannot resolve systemic connection errors within the organization |
IT Support systems | ABAP systems | R/3 Support | Connection not functional | Cannot access information on the server
Router dysfunctional. |
In conclusion, network virtualization is one of the most innovative advances in networking in the past two decades. It is the foundation of cloud computing, an effective and efficient technique of storing and managing data. Network virtualization has enabled the reduction of maintenance costs and has increased efficiency in management of information. However, it has also exposed its users to new types of threats.
Works Cited
De Marco, Marco, et al. Information systems: Crossroads for organization, management, accounting and engineering ; ItAIS: The Italian Association for Information Systems. Heidelberg: Physica-Verlag, 2012. Print.
Kim, David and Micheal Solomon. Fundamentals of information systems security. Sudbury: Jones & Bartlett Learning, 2012. Print.
“Networking 2005: networking technologies, services, and protocols : performance of computer and communication networks : mobile and wireless communication systems : , , , May 2-6, 2005 : proce.” 4th International IFIP-TC6 Networking Conference. Waterloo: Springer, 2005.
Peltier, Thomas R. Information security risk analysis. Boca Raton: Auerbach, 2001.
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee