Data Theft Issue Prevention Aspects

At its core, theft of private, proprietary, and sensitive data is a transfer or storage of this information by an unauthorized party. In other words, the offenders steal the information from electronic devices, including computers, storage devices, and servers. It can be performed from the inside by the employees of the company or by an external attack. The data can include databases of client information, internal company data, and other sensitive information (Wyre et al., 2020). Once the attackers have an access to this data, they can use it in their malicious activity, alter, or delete it without the original owner’s permission. However, in most cases, the attackers just copy the information to use it mostly for identity theft.

In this case, the data theft was performed by the external attackers to gain information on the clients. The most likely purpose of the theft was identity fraud. The access was gained by phishing the employee with the link. Once inside the database system, the attackers attempted to copy the client’s information. Unfortunately, the company failed to prevent data theft. Later, the company employed several countermeasures, including cyber security training. However, the recommendation to the company is to limit access to the sensitive information of certain employees, as the employee’s in question tasks did not include handling the client’s data. According to Abidin et al. (2019), “Employees tend to ignore policies and standard operating procedures, providing opportunities for data theft and fraud to occur, although they realize this will result in a severe impact on the reputation of a company” (p. 1). This action can ease securing the system and reduce human error and negligence.

References

Abidin, M. A. Z., Nawawi, A., & Salin, A. S. A. P. (2019). Customer data security and theft: a Malaysian organization’s experience. Information & Computer Security.

Wyre, M., Lacey, D., & Allan, K. (2020). The identity theft response system. Trends and Issues in Crime and Criminal Justice, (592), 1-18.

Cite this paper

Select style

Reference

StudyCorgi. (2023, August 6). Data Theft Issue Prevention Aspects. https://studycorgi.com/data-theft-issue-prevention-aspects/

Work Cited

"Data Theft Issue Prevention Aspects." StudyCorgi, 6 Aug. 2023, studycorgi.com/data-theft-issue-prevention-aspects/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2023) 'Data Theft Issue Prevention Aspects'. 6 August.

1. StudyCorgi. "Data Theft Issue Prevention Aspects." August 6, 2023. https://studycorgi.com/data-theft-issue-prevention-aspects/.


Bibliography


StudyCorgi. "Data Theft Issue Prevention Aspects." August 6, 2023. https://studycorgi.com/data-theft-issue-prevention-aspects/.

References

StudyCorgi. 2023. "Data Theft Issue Prevention Aspects." August 6, 2023. https://studycorgi.com/data-theft-issue-prevention-aspects/.

This paper, “Data Theft Issue Prevention Aspects”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.