Preview

Data Breach Essay

Good Essays
Open Document
Open Document
665 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Breach Essay
War is a part of the past and the present. In every war there are two sides, each hoping for land, power, or individual rights. When someone brings up the topic of war, images of guns and soldiers come to mind. But what if the war extended into cyberspace? No weapons or ruined battlegrounds, just virtual barriers and coding. It no longer becomes a two sided battle, but instead millions of individuals hidden behind computer screens. Anyone can participate in this, including terrorist groups, hackers, and phishers. And for this reason, everyone is at risk. People are getting away with their crimes because they keep information secret, working anonymously to perform illegal acts using the data stored in cyberspace. The United States government …show more content…
“A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so.” (“What is a Data Breach?”) Cyber Criminals can potentially hack cars, phones, computers, bank accounts and even baby monitors. (Murdock) With all of these things under attack, it can be hard to escape without any personal information stolen. One major data breach took place in 2014 with the Yahoo company. At least 500 million user accounts were part of the breach, giving any personal information associated with the account to the hacker. (Fiegerman) Yahoo was working with law enforcement to investigate the breach, but after 2 months, the crime still had not been solved. (Fiegerman) In this instance, the government could have been involved in regulating the activity of Yahoo users, ultimately preventing the data breach from occurring in the first place. Victims of data breaches like these suddenly feel unsafe when using the internet. According to Walker, “one in six consumers believe that they will be a victim of another data breach in the next twelve months.” This lingering sense of risk prevents citizens from feeling completely secure when accessing an account containing personal information. One of the government’s responsibilities is protecting the American people, regulating the internet is just one possible option that would assist in spreading a sense of much needed safety across the

You May Also Find These Documents Helpful

  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    TU100 - TMA02

    • 2168 Words
    • 9 Pages

    This to me is the biggest point. Having worked within the Intelligence Environment for some years of my military time it amuses and baffles me that people get so annoyed over what they feel is their personal data being used and abused. One of our biggest flaw as Humans is to believe we are each individually so important that everything we ever put online is of interest to many millions of people, (Take the phenomenon that is twitter as an example) when in reality nothing at all you say or do on line is. Yes the sites you click on are monitored to target advertising etc. but that is not you personally they are looking at it is just a number. Be that an IP address or area code to post junk mail to.…

    • 2168 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Consider the technology that defines everyday life in America- texts, email, internet, and phone calls. In performing these constant activities, most never questioned their privacy, that is, until Edward Snowden squealed on the NSA’s less than ethical maneuvers. Without citizens’ consent, the American government was collecting metadata, “all the information surround a call, including the caller’s number, the receiver's number, the time and location of the call, and how long it lasted” (Diamond). The government may have been shooting for just the bad guys, but all American civilians got caught in the crossfire. Nothing would exempt a person from these invasions of privacy, and their data would be scanned and stored just like that of a seasoned…

    • 1555 Words
    • 7 Pages
    Good Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Over the past couple of decades America has been fighting against the growing threat of terrorism. As the new millennium unravels, the age of the computer dawns the terrorists are beginning to fight on a different mainframe: the computer. The latest threat to U.S. intelligence is not terrorist attacks anymore, but cyber terrorism. As your Special Advisor on cyber security and cyber terrorism, I can prevent terrorist from all over the world from causing damage to our country.…

    • 613 Words
    • 3 Pages
    Best Essays
  • Good Essays

    Technology is expanding everyday. Our society has grown and expanded and has become extremely powerful because of new technologies. People are learning how to use computers in place of their tasks. The Internet is a prime example is of expanding technology. One can obtain yesterday’s and today’s news, listen to music, talk to a friend over seas, view pornography, and countless other things in the privacy of one’s home via the Internet. There is no way to really regulate what is on the Internet. Essentially, the government has no place on the Internet.…

    • 1567 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    US Government Watching Us

    • 360 Words
    • 2 Pages

    The internet has changed drastically for the worst the past couple of years and it is time for a change. The NSA has taken over the privacy of our internet access, which is not appropriate. When the internet was invented this is not what the creators thought would happen. The computer engineering community needs to step in and take it back from the NSA. Companies that host our private data that we once trusted we can no longer trust anymore. Our own government has betrayed us and also violated our privacy on the internet.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Data Breach Research Paper

    • 4412 Words
    • 18 Pages

    Numerous data breaches and computer intrusions have been disclosed by the nation’s largest data brokers, retailers, educational institutions, government agencies, health care entities, financial institutions, and Internet businesses. A data breach may occur when there is a loss or theft of, or other unauthorized access to, data containing sensitive personal information that results in the potential compromise of the confidentiality or integrity of data. Sensitive personal information generally includes an individual’s name, address, or telephone number, in conjunction with the individual’s Social Security number, driver’s license number, account number, credit or debit card number, or a personal identification number or password. Breach notification laws enacted by many states require the disclosure of security breaches involving sensitive personal information (Stevens, 2008).…

    • 4412 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Listening is a major port of communication, however listening must be accompanied by understanding what is being communicated. lack of understanding can lead to conflict, mistakes and stressful situations.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Today the internet has completely changed the way people communicate with each other. It has changed the people conduct commerce, changed the way people research topics, the way people entertain and the way people break the law (Schmalleger, 2011, p. 70). Many of the crimes that are committed on the internet include: prostitution, drug sales, theft, fraud, conspiracy, bullying, and harassment. As the internet becoming more and more of a dominator factor in how society is driven so has these crimes. Kids are being bullied and harassed by their peers to the point that they are committing suicide. Stopping these acts are hard because it’s very difficult tracking everyone in America’s computer and it’s illegal without the correct warrant and process to monitor someone’s actions. The more that the internet becomes an everyday use for everyday America the more is going to be taken advantage of and break the law. I can see this being beneficial or detrimental to society as a whole. It can be beneficial by connecting the world but also detrimental by someone corrupting and hacking into the world. It’s going to be on the government and us to see how this outcome turns…

    • 1059 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Terrorism is one of the most remembered and feared occurrences in the world. Terrorism changes the lives and hearts of everyone that it affects. This paper explores the different types of terrorism, who commits the acts, how it affects the surrounding world, and what can be done to prevent it. This review of the different types of terrorism focuses primarily on the specific types of terrorism. This paper then tries to relay to the reader the understanding of all types, and the differences between them.…

    • 1251 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Imagine shopping at your favorite store, you go in and look around and notice a stranger following you around at a distance. You look back and he is writing something down while you check out. People have the same vision of someone watching them online. They envision that the government is watching their activity on sites and what they download. The big question is can the government really watch us while we are online? The answer to that question is yes, due to the Patriot Act signed into congress. This act allows the government to install wiretaps and perform searches on personal computers. People are no concerned that they will be spied on while they are searching the web whether or not they have done anything wrong or not. It is easy to see why the government would want to watch people while they are online. With social media and other forums, terrorism, and other acts of violence can be brought to the surface. Just this year, the Boston Bomber learned his skills and technique online in forums and watching videos on YouTube. These kinds of acts are examples of where and how the government can step in stop an act before it is acted upon. No matter the situation, the use of the internet will always be brought to the spot light, because of the power and knowledge that people share online.…

    • 991 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There’s a global war going on right now. I’m not talking about Syria, I’m talking about the war on the Internet. As the Internet has gotten bigger over the years, it has become a bigger interest for governments all over the world. Presidents and kings have a Twitter account now, and all the plans for budget spending are put on government websites. But it also has become a bigger problem for people in power all over the world. The giant spread of the internet means that governments can’t hide anything from the people. People can have private conversation easily now, without having to meet in real life. However, it is beneficial for governments to know what people are discussing. This is what caused massive Internet surveillance. For a long time, the internet was one of the only places the governments didn’t have any surveillance. There are cameras on the streets, they can see what kind of packages you send, but they couldn’t see what you were doing on the Internet. That had to change, or so thought the people in power. Back in 1973, US president Richard Nixon had to resign after it became public that his administration bugged and wiretapped multiple political enemies. Today, the Obama administration is spying on the entire world; and they’re prosecuting the person who told everyone about it.…

    • 1073 Words
    • 5 Pages
    Good Essays