SlideShare uma empresa Scribd logo
1 de 1
Research three reported data breeches the have occurred in the U.S since January 1, 2014. Write
a five page paper on the researched data breeches. The paper should include the Corporation
where the breech occurred, the date of the breech, the number of potential individuals and how
individuals and the business are affected by this breech. Also include whether you think that
there is anything that can be done to minimize these breeches.
Solution
A record of 783 was hit by the data breaches that was tracked in 2014 according to the report
issued by Identity Theft Resource Centre.
This data breach left some of the consumers and businesses in the state of denial about the
serious nature of the issue.
Hacking was the primary cause of the data breach incidents. It highlighted the importance of user
education.

Mais conteúdo relacionado

Semelhante a Research three reported data breeches the have occurred in the U-S sin.docx

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Carolyn Kopf
 
Three tools to reduce employee apathy
Three tools to reduce employee apathyThree tools to reduce employee apathy
Three tools to reduce employee apathyStephen P. Abbey
 
1. What do hackers break in to the mostHackers have been increa.docx
1. What do hackers break in to the mostHackers have been increa.docx1. What do hackers break in to the mostHackers have been increa.docx
1. What do hackers break in to the mostHackers have been increa.docxpaynetawnya
 
A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxdeanmtaylor1545
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxbradburgess22840
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxerlindaw
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Business Ethics: The impact of technology
Business Ethics: The impact of technologyBusiness Ethics: The impact of technology
Business Ethics: The impact of technologyRakesh Mehta
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...Andrew Cannon
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case StudyAngilina Jones
 
Whitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudyWhitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudySymantec
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAXeniT Solutions nv
 
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docx
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docxChapter 4 • Data Mining Process, Methods, and Algorithms 243.docx
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docxadkinspaige22
 
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382CMR WORLD TECH
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 

Semelhante a Research three reported data breeches the have occurred in the U-S sin.docx (20)

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706
 
Three tools to reduce employee apathy
Three tools to reduce employee apathyThree tools to reduce employee apathy
Three tools to reduce employee apathy
 
1. What do hackers break in to the mostHackers have been increa.docx
1. What do hackers break in to the mostHackers have been increa.docx1. What do hackers break in to the mostHackers have been increa.docx
1. What do hackers break in to the mostHackers have been increa.docx
 
A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Business Ethics: The impact of technology
Business Ethics: The impact of technologyBusiness Ethics: The impact of technology
Business Ethics: The impact of technology
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
 
Whitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudyWhitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach Study
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
 
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docx
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docxChapter 4 • Data Mining Process, Methods, and Algorithms 243.docx
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docx
 
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 

Mais de rtodd15

Robert and Janet are discussing unemployment and inflation in their co.docx
Robert and Janet are discussing unemployment and inflation in their co.docxRobert and Janet are discussing unemployment and inflation in their co.docx
Robert and Janet are discussing unemployment and inflation in their co.docxrtodd15
 
Return on investment is calculated by dividing A) controllable margin.docx
Return on investment is calculated by dividing A) controllable margin.docxReturn on investment is calculated by dividing A) controllable margin.docx
Return on investment is calculated by dividing A) controllable margin.docxrtodd15
 
Research HIPAA Discuss with the class the importance of this type of s.docx
Research HIPAA Discuss with the class the importance of this type of s.docxResearch HIPAA Discuss with the class the importance of this type of s.docx
Research HIPAA Discuss with the class the importance of this type of s.docxrtodd15
 
Requirement Identify each of Carter-Pierce-s transactions as operating.docx
Requirement Identify each of Carter-Pierce-s transactions as operating.docxRequirement Identify each of Carter-Pierce-s transactions as operating.docx
Requirement Identify each of Carter-Pierce-s transactions as operating.docxrtodd15
 
region on DNA sequence to initiate direction until it reaches a binds.docx
region on DNA sequence to initiate direction until it reaches a binds.docxregion on DNA sequence to initiate direction until it reaches a binds.docx
region on DNA sequence to initiate direction until it reaches a binds.docxrtodd15
 
Reflect on what you think are the primary dangers or drawbacks of not.docx
Reflect on what you think are the primary dangers or drawbacks of not.docxReflect on what you think are the primary dangers or drawbacks of not.docx
Reflect on what you think are the primary dangers or drawbacks of not.docxrtodd15
 
Select the best explanation below why models improve developer - stake.docx
Select the best explanation below why models improve developer - stake.docxSelect the best explanation below why models improve developer - stake.docx
Select the best explanation below why models improve developer - stake.docxrtodd15
 
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docx
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docxRefer to the figure below to answer each question 1 Ice warming 2 Ice.docx
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docxrtodd15
 
Select one of the six criteria air pollutants and describe how you wou.docx
Select one of the six criteria air pollutants and describe how you wou.docxSelect one of the six criteria air pollutants and describe how you wou.docx
Select one of the six criteria air pollutants and describe how you wou.docxrtodd15
 
Select a Health Informatics related article from a mainstream news sou.docx
Select a Health Informatics related article from a mainstream news sou.docxSelect a Health Informatics related article from a mainstream news sou.docx
Select a Health Informatics related article from a mainstream news sou.docxrtodd15
 
Samuel has been asked to start the implementation of IPv6 on an existi.docx
Samuel has been asked to start the implementation of IPv6 on an existi.docxSamuel has been asked to start the implementation of IPv6 on an existi.docx
Samuel has been asked to start the implementation of IPv6 on an existi.docxrtodd15
 
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docx
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docxSearching a Binary Tree in C Write a C function that accepts a pointer (1).docx
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docxrtodd15
 
SAT Chemistry question- The best way to seperate potassium iodide from.docx
SAT Chemistry question- The best way to seperate potassium iodide from.docxSAT Chemistry question- The best way to seperate potassium iodide from.docx
SAT Chemistry question- The best way to seperate potassium iodide from.docxrtodd15
 
Review Topics) -References Use the References to access important valu.docx
Review Topics) -References Use the References to access important valu.docxReview Topics) -References Use the References to access important valu.docx
Review Topics) -References Use the References to access important valu.docxrtodd15
 
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docx
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docxSan Mateo Healthcare had an equity balance of $1-50 million at the beg.docx
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docxrtodd15
 
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docx
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docxS12-2 (Learning Objective 1- Explain the purposes of the statement of.docx
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docxrtodd15
 
S10-16 (Learning Objective 5- Compute and explain return on assets and.docx
S10-16 (Learning Objective 5- Compute and explain return on assets and.docxS10-16 (Learning Objective 5- Compute and explain return on assets and.docx
S10-16 (Learning Objective 5- Compute and explain return on assets and.docxrtodd15
 
Salem Corporation is considering implementing a 401k program for its e.docx
Salem Corporation is considering implementing a 401k program for its e.docxSalem Corporation is considering implementing a 401k program for its e.docx
Salem Corporation is considering implementing a 401k program for its e.docxrtodd15
 
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docx
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docxS Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docx
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docxrtodd15
 
Roy and Monica are married and will file a joint return- They have a d.docx
Roy and Monica are married and will file a joint return- They have a d.docxRoy and Monica are married and will file a joint return- They have a d.docx
Roy and Monica are married and will file a joint return- They have a d.docxrtodd15
 

Mais de rtodd15 (20)

Robert and Janet are discussing unemployment and inflation in their co.docx
Robert and Janet are discussing unemployment and inflation in their co.docxRobert and Janet are discussing unemployment and inflation in their co.docx
Robert and Janet are discussing unemployment and inflation in their co.docx
 
Return on investment is calculated by dividing A) controllable margin.docx
Return on investment is calculated by dividing A) controllable margin.docxReturn on investment is calculated by dividing A) controllable margin.docx
Return on investment is calculated by dividing A) controllable margin.docx
 
Research HIPAA Discuss with the class the importance of this type of s.docx
Research HIPAA Discuss with the class the importance of this type of s.docxResearch HIPAA Discuss with the class the importance of this type of s.docx
Research HIPAA Discuss with the class the importance of this type of s.docx
 
Requirement Identify each of Carter-Pierce-s transactions as operating.docx
Requirement Identify each of Carter-Pierce-s transactions as operating.docxRequirement Identify each of Carter-Pierce-s transactions as operating.docx
Requirement Identify each of Carter-Pierce-s transactions as operating.docx
 
region on DNA sequence to initiate direction until it reaches a binds.docx
region on DNA sequence to initiate direction until it reaches a binds.docxregion on DNA sequence to initiate direction until it reaches a binds.docx
region on DNA sequence to initiate direction until it reaches a binds.docx
 
Reflect on what you think are the primary dangers or drawbacks of not.docx
Reflect on what you think are the primary dangers or drawbacks of not.docxReflect on what you think are the primary dangers or drawbacks of not.docx
Reflect on what you think are the primary dangers or drawbacks of not.docx
 
Select the best explanation below why models improve developer - stake.docx
Select the best explanation below why models improve developer - stake.docxSelect the best explanation below why models improve developer - stake.docx
Select the best explanation below why models improve developer - stake.docx
 
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docx
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docxRefer to the figure below to answer each question 1 Ice warming 2 Ice.docx
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docx
 
Select one of the six criteria air pollutants and describe how you wou.docx
Select one of the six criteria air pollutants and describe how you wou.docxSelect one of the six criteria air pollutants and describe how you wou.docx
Select one of the six criteria air pollutants and describe how you wou.docx
 
Select a Health Informatics related article from a mainstream news sou.docx
Select a Health Informatics related article from a mainstream news sou.docxSelect a Health Informatics related article from a mainstream news sou.docx
Select a Health Informatics related article from a mainstream news sou.docx
 
Samuel has been asked to start the implementation of IPv6 on an existi.docx
Samuel has been asked to start the implementation of IPv6 on an existi.docxSamuel has been asked to start the implementation of IPv6 on an existi.docx
Samuel has been asked to start the implementation of IPv6 on an existi.docx
 
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docx
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docxSearching a Binary Tree in C Write a C function that accepts a pointer (1).docx
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docx
 
SAT Chemistry question- The best way to seperate potassium iodide from.docx
SAT Chemistry question- The best way to seperate potassium iodide from.docxSAT Chemistry question- The best way to seperate potassium iodide from.docx
SAT Chemistry question- The best way to seperate potassium iodide from.docx
 
Review Topics) -References Use the References to access important valu.docx
Review Topics) -References Use the References to access important valu.docxReview Topics) -References Use the References to access important valu.docx
Review Topics) -References Use the References to access important valu.docx
 
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docx
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docxSan Mateo Healthcare had an equity balance of $1-50 million at the beg.docx
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docx
 
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docx
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docxS12-2 (Learning Objective 1- Explain the purposes of the statement of.docx
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docx
 
S10-16 (Learning Objective 5- Compute and explain return on assets and.docx
S10-16 (Learning Objective 5- Compute and explain return on assets and.docxS10-16 (Learning Objective 5- Compute and explain return on assets and.docx
S10-16 (Learning Objective 5- Compute and explain return on assets and.docx
 
Salem Corporation is considering implementing a 401k program for its e.docx
Salem Corporation is considering implementing a 401k program for its e.docxSalem Corporation is considering implementing a 401k program for its e.docx
Salem Corporation is considering implementing a 401k program for its e.docx
 
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docx
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docxS Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docx
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docx
 
Roy and Monica are married and will file a joint return- They have a d.docx
Roy and Monica are married and will file a joint return- They have a d.docxRoy and Monica are married and will file a joint return- They have a d.docx
Roy and Monica are married and will file a joint return- They have a d.docx
 

Último

ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 

Último (20)

ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 

Research three reported data breeches the have occurred in the U-S sin.docx

  • 1. Research three reported data breeches the have occurred in the U.S since January 1, 2014. Write a five page paper on the researched data breeches. The paper should include the Corporation where the breech occurred, the date of the breech, the number of potential individuals and how individuals and the business are affected by this breech. Also include whether you think that there is anything that can be done to minimize these breeches. Solution A record of 783 was hit by the data breaches that was tracked in 2014 according to the report issued by Identity Theft Resource Centre. This data breach left some of the consumers and businesses in the state of denial about the serious nature of the issue. Hacking was the primary cause of the data breach incidents. It highlighted the importance of user education.