This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.Overview
After studying the latest security incidents reported on the online database from privacyrights.org, it can be noticed that a significant percentage was targeted by financial reasons, while another part was focused on personal data theft. One of the most common root causes for the data breaches was the insufficiently applied security on holder’s side and the lack of patch/update management (i.e. with respect to the security of both clients and servers). In many situations the information revealed on privacyrights.org was sufficient for explaining what would have been the most appropriate countermeasures to be undertaken; on the other hand, other security incidents were better explained by external sources, together with the brief description of security controls that would have prevented the information leakage. The preferred targets of the security-based attacks were both governmental entities and private companies. This result can be explained by the current spread of security threats and their propagation capabilities, since the attacks had become more sophisticated compared with two decades ago....