Understanding Information Security Investigations Essay

Total Length: 642 words ( 2 double-spaced pages)

Total Sources: 4

Page 1 of 2

Lessons From Target Data Breach

There are several lessons learnt from this case. First, I have learnt that the experience of Target on its data breach continues to jeopardize the confidentiality of stored information and the market value of the firm. Therefore, the company deserves to invest much attention, especially in research. Worry of disclosure of credit card information, private details, and other IDs is often the reason why customers leave companies. After identification of breach, Target Company is compelled to pay court costs, charges and has to get into enhancing its data security. The traders lose assurance in the company and the eventual fall in market value. Many studies have been performed to assess the speculation as further explored in this study (Bayuk, 2010). The primary objective of this document is to evaluate the chance of forecast of a Target data violation and assess its effect on industry value based on the outcomes of recent reports and research of representative cases (Grove, 2010).

Stuck Writing Your "Understanding Information Security Investigations" Essay?



Domain

Secondly, with the proliferation of similar incidences in the corporate sector, I have learnt that businesses can embrace various technological strategies to ensure the safety and security of their customer data. While providing a high-level of security to protect the data while also protecting the owner of the data can be challenging, it is worth the cost. This study explores relevant lessons acquired from Target data breach (Peitz & Waldfogel, 2012).

Research problem

Interestingly, nearly all the conducted studies contain the same concept that present Target data breaches have more serious effect than the historical ones. Although the real outcomes of research are not exactly the same, there is a damaging effect of the company's data breaches. Third, I have also learnt that the fall in market value happens once the disclosure of information is violated. This document is only the preliminary attempt to lay the fundamentals for the following research targeted on lessons learnt from….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Understanding Information Security Investigations" (2014, March 19) Retrieved May 12, 2024, from
https://www.aceyourpaper.com/essays/understanding-information-security-investigations-185465

Latest MLA Format (8th edition)

Copy Reference
"Understanding Information Security Investigations" 19 March 2014. Web.12 May. 2024. <
https://www.aceyourpaper.com/essays/understanding-information-security-investigations-185465>

Latest Chicago Format (16th edition)

Copy Reference
"Understanding Information Security Investigations", 19 March 2014, Accessed.12 May. 2024,
https://www.aceyourpaper.com/essays/understanding-information-security-investigations-185465