You are on page 1of 6

1-The article:

Title: 2014 Hack Retrospective, Or Why Security Ecosystems Matter


Posted Jan 8, 2015 by Laurent Gil
Editors note: Laurent Gil co-founded Zenedge after witnessing a major DDoS attack where
cyber-terrorists took down a colleagues company network for several days, costing the
organization $1.2 million in revenue.
2. Credit card data breached as a result of system hacks was a major issue in the year 2014. Big
companies like Target, Home Depot and Sony was stolen had their data stolen and caused the
companies and bad publicity and caused the consumer a lot of headache. They breaches are
especially expensive because these companies need to make sure such breach does not happen
again. They need to plug any holes that their systems have and allowed the hacking. Although
many of these companies has massive security around their systems, many of the hacks find their
way in through an email exchanged with someone outside the company with an email contains
Malware. The Malware worms itself inside the systems. So the employees have to be made
aware of such risks. Sony latest hack came in through the same hole another hack used to Sony
in 2011. So the hole was never closed. Many businesses use cloud services that is does not
encrypted the data, thus putting themselves in harms way. Targeted attacks have doubled from
2013 to 2014 and companies are finding it more difficult to plug all of the holes across a business
ecosystems network: Corporate infrastructures, culture and even varying degrees of IT
understanding can hinder standardizing security platforms and protocols. Companies now have
contacts with other businesses and communicate and exchange data with other companies. All
companies should use the same protocols to battle hacking and data breach.

3. Google and yahoo.


Search phrase: Data breach prevention
Google.com
I typed, Data breach prevention and in the search bar, I had Data breach prevention
techniques came up. That was something that would be good for my research
Yahoo.com
I did the same thing but instead it gave me Data security breach prevention. Data breach
prevention techniques was not one of the selections. So I typed Data breach prevention
techniques in to see what kind of results I get.
Search results: Yahoo stayed on the same title for the most part. It gave me the links with
-Data Breach Prevention Tips - Kroll Cyber Security
-Data breach prevention techniques: Helping customers avoid
-HIPAA data breach prevention tips for health care IT leaders (11 Apr 2013).
-Tips for healthcare data breach prevention from Verizon research (Apr 2013)
-Data Breach Prevention Techniques Helping Customers Avoid (Apr 2009)
-Data breach planning and prevention tips | Security Thinking Cap (Oct 2011)
Google on the other hand gave me titles that is around the subject but not exactly, the same title
which maybe significant the title.
-Data Breach Solutions - PrivacyAssociation.org
-Data Breach Prevention Tips Kroll (2011)
-Finding the Right Balance: Data Breach Prevention vs
-Cyber Security Requires a Three-stage Approach to Data (June 2013)

-Understanding and Preventing Data Breaches - Diversified (2012)


-Making Data Breach Prevention a Matter of Policy in (Jan 2013)
-Data breach prevention techniques: Helping customers (Apr 2009)
-Split to Secure: New Data Theft Prevention Techniques (Jan 2013)
Both searched are pretty the same. Both had advertisements and both returned results related to
the subject and both give suggested other searches.
Google seem to venture more from the title and bring results to the subject.
4- Yahoo.com
Data Breach Prevention Tips - Kroll Cyber Security
http://www.krollcybersecurity.com/about-us/
1. (2011)
2. Yes
3. Website - About the company Krollcybersecurity has been in the security business.
4. Yes. The information is trust worthy. Yes supported by evidence and it has been tested.
5. Purpose to market and sell services.
Google:
Understanding and Preventing Data Breaches - Diversified (2012)
http://www.dii-ins.com/wp-content/uploads/2013/02/Understanding-and-Preventing-DataBreaches.pdf
1. (2012)
2. Yes
3. Diversified Insurance industries, Inc.
4. Yes supported by evidence and it has been tested.

5. Purpose to market and sell services.


5.
- Data breach prevention techniques
- I tried using the database Library, Information Science & Technology Abstracts. But the
articles where too technical. I wanted something with more of researched, unbiased and less
technical.

Data Breach: From Notification to Prevention Using PCI DSS.

By: SHAW, ABRAHAM. Columbia Journal of Law & Social Problems. Summer2010,
Vol. 43 Issue 4, p517-562. 46p.

The efficiency and integrity of payment card systems: Industry views on the risks posed
by data breaches.

By: Cheney, Julia S.; Hunt, Robert M.; Jacob, Katy R.; Porter, Richard D.; Summers,
Bruce J. Economic Perspectives. 2012, Vol. 36 Issue 4, p130-146. 17p.

6. The articles from CCBC where easily accessed from CCBC library database online for the
most part unless they were not available online to be downloaded. But the searches are easy and
the filters can narrow down the searches are easily set. You can search the different databases
depending on the subject you are looking for. The internet searches do not contain all the filters
available from the online library and you have to sift through a lot of articles to get to what you
want. The database contain articles from journals that are very recent from the latest version of
the publications and they have some that are older when needed. The period to search for an
article is easily set with a slide bar on the search screen. With online searches, there is no way to

indicate on the time you want the article to be published within. The journals are for the most
part from reputable journals that are used by the different industries for latest publications,
finding and studies. The articles published by experts in the subject matter. Research papers done
for academia or for the corporate world are usually done by qualified people with supported data
and references. On the other hand, the online articles found by regular searches are published by
businesses that want to attract customers with their publications or studies. So a lot of them are
biased to one solution to another. You can find the publications from the library sometimes if
you pay for a subscription to the journal or if free, you have to use a distinct search string using
the author and the title.
7. MLA format
References:
1. Laurent Gil. 2014 Hack Retrospective, Or Why Security Ecosystems Matter.
(http://techcrunch.com/2015/01/08/2014-hack-retrospective-or-why-security-ecosystemsmatter/) Web. 8 January 2015.
2. KROLL

CYBER

SECURITY.

Data

Breach

Prevention

Tips.

(http://www.krollcybersecurity.com/about-us/) Web. 2011.


3. DIVERSIFIED INSUARANCE INDUSTRIES, INC.( http://www.dii-ins.com/wpcontent/uploads/2013/02/Understanding-and-Preventing-Data-Breaches.pdf) Web. 2012.
4. Cheney, Julia S.; Hunt, Robert M.; Jacob, Katy R.; Porter, Richard D.; Summers, Bruce J.
The efficiency and integrity of payment card systems: Industry views on the risks posed
by data breaches. Economic Perspectives. 2012, Vol. 36 Issue 4, p130-146. 17p.

5. SHAW, ABRAHAM. Data Breach: From Notification to Prevention Using PCI DSS.
Columbia Journal of Law & Social Problems. Summer2010, Vol. 43 Issue 4, p517-562.
46p.

You might also like