You are on page 1of 1

Amanda Watson

Liberty University Online

CSIS 325

Research Paper – Topic Approval

The topic I would like to utilize for my research paper would answer the following question: How does a
database recover after being breached and exploited by hackers? Examples of information that would
be covered would involve how the breach affects the information within the database, how to prevent
additional damage from being made, how to protect against future breaches, and how to recover
information that has been compromised, deleted or otherwise. Another thing that would be included
would be a few examples of well-known and some not-so-well-known database breaches and what
these companies did to mitigate their issues. Because breaches are a common threat to businesses and
other entities that may use databases, as well as there being solutions for stopping attacks and also
preventing them beforehand, finding scholarly sources would not be an issue.

You might also like