This paper examines methods for improving cyberspace security and preventing subsequent data leaks, including encryption, MFA, updates, training, and segmentation. It assesses the advantages like accuracy, compliance, and customer confidence against giant negatives like expense, disruptions, and strict management. Another loophole is also discussed in the paper. These include changing threat models, the importance of insider threats, several issues of resource scarcity and the need for proportionality that point to the requirement for technical solutions alongside comprehensive policies and user training and awareness. In conclusion, it emphasizes the need for proper and innovative measures to prevent data hacking in a world that is becoming increasingly computerized.
How Cyber Security Can Be Ensured While Reducing Data Breaches: Pros and Cons of Mitigating a Data Breach?
Publication Information
Journal Title: Cyber Law Reporter
Author(s): Iqra Naseer
Published On: 14/09/2023
Volume: 2
Issue: 3
First Page: 16
Last Page: 22
ISSN: 2583-7060
Publisher: The Law Brigade Publisher
DOI Not Allotted [Get DOI]
Cite this Article
Iqra Naseer, How Cyber Security Can Be Ensured While Reducing Data Breaches: Pros and Cons of Mitigating a Data Breach?, Volume 2 Issue 3, Cyber Law Reporter, pp 16-22, Published on 14/09/2023, Available at https://cylr.thelawbrigade.com/article/how-cyber-security-can-be-ensured-while-reducing-data-breaches-pros-and-cons-of-mitigating-a-data-breach/
Abstract
Keywords: Cybersecurity, Data Breaches, Mitigation Strategies, Encryption, Multi-Factor Authentication (MFA)
Share this research
© 2015 - 2024 All Rights Reserved by The Law Brigade Publishers
Latest Publications
Submissions Open!
Authors are invited to submit their research paper in the journal. Please click the Submit Button below to proceed.
Notice