Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

reply to: It would seem that the discussion post this week is very broad, as security breaches in todays technological world are all too common.

reply to: It would seem that the discussion post this week is very broad, as security breaches in todays technological world are all too common. From major companies intranet, to an average persons cell phone, there isn't anyone immune to them. IBM defines a data breach as "any security incident in which unauthorized parties gain access to sensitive data or confidential information, including personal data (Social Security numbers, bank account numbers, healthcare data) or corporate data (customer data records, intellectual property, financial information)"(IBM,2023). They go on to explain that many times, cyberattacks are used interchangeably with data/security breaches, but that isn't necessarily accurate. Not all data breaches are cyberattacks and not all cyberattacks are data breaches. A common security breach can be as common as an employee stealing information, or something as simple as a person clicking on a phishing email. Emails can also carry malicious software, designed to steal information from the unknowing victim. This malicious software can be a type of data collection system.
Along the lines of data collection systems, a well known one is TikTok. Just from reading TikToks own privacy policy, we can see that they collect just about every piece of information from your phone and TikTok account, to include your name, age, phone and social media contact lists, device clip board information, and so much more. While a user must agree to these terms, it is not always transparent just how much you are agreeing to at the time unless you thoroughly read the privacy policy and have an understanding of the technology. Most apps these days cater in some sort to the user that is using them by collecting personal data, which is pretty scary in the grand scheme of things.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Finance The Role Of Data Analytics In Manda Due Diligence

Authors: Ps Publishing

1st Edition

B0CR6SKTQG, 979-8873324675

More Books

Students also viewed these Databases questions

Question

Why is stakeholder engagement important?

Answered: 1 week ago

Question

Define the goals of persuasive speaking

Answered: 1 week ago