Data Loss Prevention

Masters
Essay
Technology
Pages 8 (2008 words)
Download 0
It seems to be very common nowadays that various companies, universities, and governmental organizations collect personal information, with or without the individual's consent, and leave it lying around for the wrong people to get their hands on. This information includes a person's name, address, telephone number, occupation, and may include valuable information like his credit card number, account number, and salary, which can prove to be extremely dangerous, if fallen into some wrong hands.

Introduction


Although the number of incidents regarding personal data loss would normally be expected to decrease due to the huge amounts of both financial and social losses incurred, it is still on the rise. According to Mary Monahan, a senior analyst at Javelin Strategy & Research, a Pleasanton research organization, 312 security breaches occurred in 2006 in the United States, giving away 20 million records, while in 2007, 446 security breaches occurred resulting in the exposure of 128 million records. Just last month, a laptop containing the personal information regarding the 51,000 present and former employees of Agilent Technologies of Santa Clara, was stolen from a car of Stock & Options Solutions of San Jose. The latter organization has since then raised its security level. (Javelin, 2008)
Even though the number of security breaches grew by more than a hundred in the United States from 2006 to 2007, ironically, there was a slight decrease in the losses incurred due to these infiltrations. ...
Download paper
Not exactly what you need?

Related papers

Data Hack at Monster.com
The types of service offered include help with resumes, cover letters, company research, networking, and advice targeted to individuals whose careers are currently in a transitional state. Career-management advisors are on hand for daily chats if required. The site is well organized and easy to navigate.…
Data Warehouse assignment
The data was analyzed with respect to the time dimension - week. Sales were analyzed against the customers weekly. It was identified that the sales amount graph for the six weeks of 2005 for ALL the customers generated the following trend:…
Data Structures and Algorithms
And therefore, this might be comfortable for usages connected with textual data. Where there is image related data, the exercise might become pretty cumbersome and might not be possible to realize both the spatial and spectral data to be brought under the Huffman Code compression technique. In order to increase the efficiency of coding even while using the text compression techniques. For this…
Data Loss Prevention
Although the number of incidents regarding personal data loss would normally be expected to decrease due to the huge amounts of both financial and social losses incurred, it is still on the rise. According to Mary Monahan, a senior analyst at Javelin Strategy & Research, a Pleasanton research organization, 312 security breaches occurred in 2006 in the United States, giving away 20 million records,…
Data Management
Soumen et al (2009) agree that data quantity surrounding us is humongous and the amount of information bombarding us is increasing. Making sense of this increasing data volume requires data mining skills and techniques that have evolved with increase in computing power. An allied discipline is Competitive intelligence which is a discipline used for improving market standing, improving strategic…
Data Warehousing
It focuses on how well the data is stored for better analysis and reporting of information by the analysts. There are tools that are used to move the data into the storage area and the intelligence tools ensure there is efficiency in delivery of services to the customers. The high changing technology is important for an organization since it integrates data for easier analysis and data reporting.…
Data and Network Security
As far as the location of the company's office is concerned, 'enterprise Training solutions' offices are located in 4 adjacent rooms situated on the ground floor of a 4 storied building. In addition, the company also maintains a single office room in the first floor of the building. Under the existing situation, anyone is allowed access up to the reception area through a shared entrance. This…