SlideShare a Scribd company logo
1 of 1
Research three reported data breeches the have occurred in the U.S since January 1, 2014. Write
a five page paper on the researched data breeches. The paper should include the Corporation
where the breech occurred, the date of the breech, the number of potential individuals and how
individuals and the business are affected by this breech. Also include whether you think that
there is anything that can be done to minimize these breeches.
Solution
A record of 783 was hit by the data breaches that was tracked in 2014 according to the report
issued by Identity Theft Resource Centre.
This data breach left some of the consumers and businesses in the state of denial about the
serious nature of the issue.
Hacking was the primary cause of the data breach incidents. It highlighted the importance of user
education.

More Related Content

Similar to Research three reported data breeches the have occurred in the U-S sin.docx

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Carolyn Kopf
 
Three tools to reduce employee apathy
Three tools to reduce employee apathyThree tools to reduce employee apathy
Three tools to reduce employee apathyStephen P. Abbey
 
1. What do hackers break in to the mostHackers have been increa.docx
1. What do hackers break in to the mostHackers have been increa.docx1. What do hackers break in to the mostHackers have been increa.docx
1. What do hackers break in to the mostHackers have been increa.docxpaynetawnya
 
A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxdeanmtaylor1545
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxbradburgess22840
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxerlindaw
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Business Ethics: The impact of technology
Business Ethics: The impact of technologyBusiness Ethics: The impact of technology
Business Ethics: The impact of technologyRakesh Mehta
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...Andrew Cannon
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case StudyAngilina Jones
 
Whitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudyWhitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudySymantec
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAXeniT Solutions nv
 
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docx
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docxChapter 4 • Data Mining Process, Methods, and Algorithms 243.docx
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docxadkinspaige22
 
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382CMR WORLD TECH
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 

Similar to Research three reported data breeches the have occurred in the U-S sin.docx (20)

Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706
 
Three tools to reduce employee apathy
Three tools to reduce employee apathyThree tools to reduce employee apathy
Three tools to reduce employee apathy
 
1. What do hackers break in to the mostHackers have been increa.docx
1. What do hackers break in to the mostHackers have been increa.docx1. What do hackers break in to the mostHackers have been increa.docx
1. What do hackers break in to the mostHackers have been increa.docx
 
A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Business Ethics: The impact of technology
Business Ethics: The impact of technologyBusiness Ethics: The impact of technology
Business Ethics: The impact of technology
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
 
Whitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudyWhitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach Study
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
 
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docx
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docxChapter 4 • Data Mining Process, Methods, and Algorithms 243.docx
Chapter 4 • Data Mining Process, Methods, and Algorithms 243.docx
 
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 

More from rtodd15

Robert and Janet are discussing unemployment and inflation in their co.docx
Robert and Janet are discussing unemployment and inflation in their co.docxRobert and Janet are discussing unemployment and inflation in their co.docx
Robert and Janet are discussing unemployment and inflation in their co.docxrtodd15
 
Return on investment is calculated by dividing A) controllable margin.docx
Return on investment is calculated by dividing A) controllable margin.docxReturn on investment is calculated by dividing A) controllable margin.docx
Return on investment is calculated by dividing A) controllable margin.docxrtodd15
 
Research HIPAA Discuss with the class the importance of this type of s.docx
Research HIPAA Discuss with the class the importance of this type of s.docxResearch HIPAA Discuss with the class the importance of this type of s.docx
Research HIPAA Discuss with the class the importance of this type of s.docxrtodd15
 
Requirement Identify each of Carter-Pierce-s transactions as operating.docx
Requirement Identify each of Carter-Pierce-s transactions as operating.docxRequirement Identify each of Carter-Pierce-s transactions as operating.docx
Requirement Identify each of Carter-Pierce-s transactions as operating.docxrtodd15
 
region on DNA sequence to initiate direction until it reaches a binds.docx
region on DNA sequence to initiate direction until it reaches a binds.docxregion on DNA sequence to initiate direction until it reaches a binds.docx
region on DNA sequence to initiate direction until it reaches a binds.docxrtodd15
 
Reflect on what you think are the primary dangers or drawbacks of not.docx
Reflect on what you think are the primary dangers or drawbacks of not.docxReflect on what you think are the primary dangers or drawbacks of not.docx
Reflect on what you think are the primary dangers or drawbacks of not.docxrtodd15
 
Select the best explanation below why models improve developer - stake.docx
Select the best explanation below why models improve developer - stake.docxSelect the best explanation below why models improve developer - stake.docx
Select the best explanation below why models improve developer - stake.docxrtodd15
 
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docx
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docxRefer to the figure below to answer each question 1 Ice warming 2 Ice.docx
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docxrtodd15
 
Select one of the six criteria air pollutants and describe how you wou.docx
Select one of the six criteria air pollutants and describe how you wou.docxSelect one of the six criteria air pollutants and describe how you wou.docx
Select one of the six criteria air pollutants and describe how you wou.docxrtodd15
 
Select a Health Informatics related article from a mainstream news sou.docx
Select a Health Informatics related article from a mainstream news sou.docxSelect a Health Informatics related article from a mainstream news sou.docx
Select a Health Informatics related article from a mainstream news sou.docxrtodd15
 
Samuel has been asked to start the implementation of IPv6 on an existi.docx
Samuel has been asked to start the implementation of IPv6 on an existi.docxSamuel has been asked to start the implementation of IPv6 on an existi.docx
Samuel has been asked to start the implementation of IPv6 on an existi.docxrtodd15
 
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docx
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docxSearching a Binary Tree in C Write a C function that accepts a pointer (1).docx
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docxrtodd15
 
SAT Chemistry question- The best way to seperate potassium iodide from.docx
SAT Chemistry question- The best way to seperate potassium iodide from.docxSAT Chemistry question- The best way to seperate potassium iodide from.docx
SAT Chemistry question- The best way to seperate potassium iodide from.docxrtodd15
 
Review Topics) -References Use the References to access important valu.docx
Review Topics) -References Use the References to access important valu.docxReview Topics) -References Use the References to access important valu.docx
Review Topics) -References Use the References to access important valu.docxrtodd15
 
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docx
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docxSan Mateo Healthcare had an equity balance of $1-50 million at the beg.docx
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docxrtodd15
 
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docx
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docxS12-2 (Learning Objective 1- Explain the purposes of the statement of.docx
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docxrtodd15
 
S10-16 (Learning Objective 5- Compute and explain return on assets and.docx
S10-16 (Learning Objective 5- Compute and explain return on assets and.docxS10-16 (Learning Objective 5- Compute and explain return on assets and.docx
S10-16 (Learning Objective 5- Compute and explain return on assets and.docxrtodd15
 
Salem Corporation is considering implementing a 401k program for its e.docx
Salem Corporation is considering implementing a 401k program for its e.docxSalem Corporation is considering implementing a 401k program for its e.docx
Salem Corporation is considering implementing a 401k program for its e.docxrtodd15
 
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docx
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docxS Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docx
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docxrtodd15
 
Roy and Monica are married and will file a joint return- They have a d.docx
Roy and Monica are married and will file a joint return- They have a d.docxRoy and Monica are married and will file a joint return- They have a d.docx
Roy and Monica are married and will file a joint return- They have a d.docxrtodd15
 

More from rtodd15 (20)

Robert and Janet are discussing unemployment and inflation in their co.docx
Robert and Janet are discussing unemployment and inflation in their co.docxRobert and Janet are discussing unemployment and inflation in their co.docx
Robert and Janet are discussing unemployment and inflation in their co.docx
 
Return on investment is calculated by dividing A) controllable margin.docx
Return on investment is calculated by dividing A) controllable margin.docxReturn on investment is calculated by dividing A) controllable margin.docx
Return on investment is calculated by dividing A) controllable margin.docx
 
Research HIPAA Discuss with the class the importance of this type of s.docx
Research HIPAA Discuss with the class the importance of this type of s.docxResearch HIPAA Discuss with the class the importance of this type of s.docx
Research HIPAA Discuss with the class the importance of this type of s.docx
 
Requirement Identify each of Carter-Pierce-s transactions as operating.docx
Requirement Identify each of Carter-Pierce-s transactions as operating.docxRequirement Identify each of Carter-Pierce-s transactions as operating.docx
Requirement Identify each of Carter-Pierce-s transactions as operating.docx
 
region on DNA sequence to initiate direction until it reaches a binds.docx
region on DNA sequence to initiate direction until it reaches a binds.docxregion on DNA sequence to initiate direction until it reaches a binds.docx
region on DNA sequence to initiate direction until it reaches a binds.docx
 
Reflect on what you think are the primary dangers or drawbacks of not.docx
Reflect on what you think are the primary dangers or drawbacks of not.docxReflect on what you think are the primary dangers or drawbacks of not.docx
Reflect on what you think are the primary dangers or drawbacks of not.docx
 
Select the best explanation below why models improve developer - stake.docx
Select the best explanation below why models improve developer - stake.docxSelect the best explanation below why models improve developer - stake.docx
Select the best explanation below why models improve developer - stake.docx
 
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docx
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docxRefer to the figure below to answer each question 1 Ice warming 2 Ice.docx
Refer to the figure below to answer each question 1 Ice warming 2 Ice.docx
 
Select one of the six criteria air pollutants and describe how you wou.docx
Select one of the six criteria air pollutants and describe how you wou.docxSelect one of the six criteria air pollutants and describe how you wou.docx
Select one of the six criteria air pollutants and describe how you wou.docx
 
Select a Health Informatics related article from a mainstream news sou.docx
Select a Health Informatics related article from a mainstream news sou.docxSelect a Health Informatics related article from a mainstream news sou.docx
Select a Health Informatics related article from a mainstream news sou.docx
 
Samuel has been asked to start the implementation of IPv6 on an existi.docx
Samuel has been asked to start the implementation of IPv6 on an existi.docxSamuel has been asked to start the implementation of IPv6 on an existi.docx
Samuel has been asked to start the implementation of IPv6 on an existi.docx
 
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docx
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docxSearching a Binary Tree in C Write a C function that accepts a pointer (1).docx
Searching a Binary Tree in C Write a C function that accepts a pointer (1).docx
 
SAT Chemistry question- The best way to seperate potassium iodide from.docx
SAT Chemistry question- The best way to seperate potassium iodide from.docxSAT Chemistry question- The best way to seperate potassium iodide from.docx
SAT Chemistry question- The best way to seperate potassium iodide from.docx
 
Review Topics) -References Use the References to access important valu.docx
Review Topics) -References Use the References to access important valu.docxReview Topics) -References Use the References to access important valu.docx
Review Topics) -References Use the References to access important valu.docx
 
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docx
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docxSan Mateo Healthcare had an equity balance of $1-50 million at the beg.docx
San Mateo Healthcare had an equity balance of $1-50 million at the beg.docx
 
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docx
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docxS12-2 (Learning Objective 1- Explain the purposes of the statement of.docx
S12-2 (Learning Objective 1- Explain the purposes of the statement of.docx
 
S10-16 (Learning Objective 5- Compute and explain return on assets and.docx
S10-16 (Learning Objective 5- Compute and explain return on assets and.docxS10-16 (Learning Objective 5- Compute and explain return on assets and.docx
S10-16 (Learning Objective 5- Compute and explain return on assets and.docx
 
Salem Corporation is considering implementing a 401k program for its e.docx
Salem Corporation is considering implementing a 401k program for its e.docxSalem Corporation is considering implementing a 401k program for its e.docx
Salem Corporation is considering implementing a 401k program for its e.docx
 
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docx
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docxS Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docx
S Wh Cmput listest bekow has the greatest molar solutiliy in water- 4).docx
 
Roy and Monica are married and will file a joint return- They have a d.docx
Roy and Monica are married and will file a joint return- They have a d.docxRoy and Monica are married and will file a joint return- They have a d.docx
Roy and Monica are married and will file a joint return- They have a d.docx
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Research three reported data breeches the have occurred in the U-S sin.docx

  • 1. Research three reported data breeches the have occurred in the U.S since January 1, 2014. Write a five page paper on the researched data breeches. The paper should include the Corporation where the breech occurred, the date of the breech, the number of potential individuals and how individuals and the business are affected by this breech. Also include whether you think that there is anything that can be done to minimize these breeches. Solution A record of 783 was hit by the data breaches that was tracked in 2014 according to the report issued by Identity Theft Resource Centre. This data breach left some of the consumers and businesses in the state of denial about the serious nature of the issue. Hacking was the primary cause of the data breach incidents. It highlighted the importance of user education.