Privacy and security governances
1
Privacy and Security Governances
Student”s Name
School Name
Course name
Professor
Date
2
Privacy and Security Governances
A security breach is defined as the performance of any act that results in untheorized
access to information of immense value available in computers, networks, and applications that
work on data. Protection of data if adequately promoted by the availability of security and
privacy within the organization’s structure. It ensures that the security breach is achieved to avoid
the access of confidential data. In the recent past, hackers have developed the freedom of
accessing data belonging to different organizations and people on the continent (Singh,2020).
For instance, Equifax organizations deal with the credit reporting agency responsible for the
citizens’ financial health analysis. Personal details such as a home address, telephone numbers,
and social security identity was breached to unprecedented magnitudes, with thousands and
thousands affected.
Using the Consumer criticism portal, attackers manipulated a security patch that was
unstable for a short period because of untold internal disorganizations inside the organization.
The availability of non-segmentation of the company portal from various attackers’ servers that
lack-inability enabled them to manipulate details and manipulated different structures of the
same kind (Singh,2020). The attackers controlled to tug out data, ignored, in unencrypted
paperwork because the encryption certificate had now not been renewed for some time.
Adequate cybersecurity measures are essential in the era where huge vast of data is
conducted through the web every time. Alongside cybersecurity, the availability of suitable
security products and controls is the bracing method that seems to solve a significant cyberattacked security adaptation that controls several company key levels (Singh,2020). In the case
of the Equifax data breach, it causes the exposed compromises conducted at the high expense of
3
the achieving data, which had human errors leading to improper management of major internal
processes within the company set up.
The lack of renewing an encryption certificate for a company storing such data securely
of personal details was a tremendous human error due to exposure. The data became challenging
to comprehend for encryption and proper digests in the setting present (Singh,2020). In addition,
the availability of advanced technology causes onsite, independent cyber-security management
to be essential for storing important user personal details. It is possible to mitigate such risks of
data breaches by involving a team that leads in flagging a violation when it arises.
4
References
Singh, D. (2020). Towards data privacy and security framework in big data
governance. International Journal of Software Engineering and Computer Systems, 6(1),
41-51.
…