Analysis of Computer Security Breaches

Cybercrime is on the rise, and one of the most notable indicators is the number of computer security breaches detected worldwide. The Ponemon Institute reported that cyberattacks involving computer security breaches became more frequent, costly, and time-consuming for the victim firms to resolve (as cited in Udo et al., 2018). There are many factors that contribute to this alarming situation. These include the growth in Internet use, expansion of the hacker community, intentional insider misuse, increasing complexity of computing environments, and increased reliance on commercial software with known vulnerabilities.

Firstly, it is self-evident that the number of people who use different technological devices and are permanently connected to the Internet has been growing rapidly since the early 2000s. This includes individuals, academia, and businesses (Udo et al., 2018). Together, they constitute an attractive ever-growing base of potential victims of cyberattacks of different sorts. Subsequently, as the number of people using the Internet and various technical devices grows, so does the number of attacks as it is easier to find victims and steal more on average. Secondly, as the overall community of Internet users grows, so does the community of hackers, who are attracted to the previously mentioned factor of the growth of their potential victim base (Udo et al., 2018). While the motivation of hackers can vary, they all pose threats to collective cybersecurity.

Thirdly, there is a problem with employees and their intended and unintended actions. According to D’Arcy et al. (2008, p. 79), one of the most common reasons for security breaches these days is the “intentional insider misuse of information systems resources (IS misuse).” For instance, in up to 75% of cases, security incidents arise within the victim organizations. In many cases, this happens due to the fact that employees do not understand the risks associated with their actions, and the companies do not provide adequate training. The fourth reason is the increase in the complexity of computer systems and environments; such increases always result in a higher likelihood of security breaches as the system becomes more vulnerable (Reynolds, 2018). Finally, the mass installment of commercial software by businesses and individuals increases their risks, as any vulnerability found in that software can cause problems for all of its users (Reynolds, 2018). These are some of the most prominent and common factors that affect cybersecurity nowadays.

References

D’Arcy, J., Hovav, A., & Galletta, D. (2008). User awareness of security countermeasures and its impact on information systems misuse A deterrence approach. Information Systems Research, 20(1), 79-98. Web.

Reynolds, G.W. (2018). Ethics in information technology (6th ed.). Cengage Learning.

Udo, G., Bagchi, K., & Kirs, P. (2018). Analysis of the growth of security breaches: A multi-growth model approach. Issues in Information Systems, 19(4), 176-186. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2023, June 10). Analysis of Computer Security Breaches. https://studycorgi.com/analysis-of-computer-security-breaches/

Work Cited

"Analysis of Computer Security Breaches." StudyCorgi, 10 June 2023, studycorgi.com/analysis-of-computer-security-breaches/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2023) 'Analysis of Computer Security Breaches'. 10 June.

1. StudyCorgi. "Analysis of Computer Security Breaches." June 10, 2023. https://studycorgi.com/analysis-of-computer-security-breaches/.


Bibliography


StudyCorgi. "Analysis of Computer Security Breaches." June 10, 2023. https://studycorgi.com/analysis-of-computer-security-breaches/.

References

StudyCorgi. 2023. "Analysis of Computer Security Breaches." June 10, 2023. https://studycorgi.com/analysis-of-computer-security-breaches/.

This paper, “Analysis of Computer Security Breaches”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.