Read the case study “To Bid or Not to Bid”

In the era of digitization, Data is considered as wealth and life of an organization. Large amounts of sensitive data is stored across the organization…

In the era of digitization, Data is considered as wealth and life of an organization. Large amounts of sensitive data is stored across the organization and it is very important to implement proper steps to preserve the integrity and confidentiality of the data. Data breach is most vital security breach which effects the integrity and confidentiality of data resulting in significant financial loss for the organizations and it also effects the reputation of the organization. Organizations that store sensitive data are generally soft targets for data breaches. Besides confidentiality, Data integrity which generally refers to the completeness and consistency of data can be dangerous as it is not easily detectable if altered. In most of the data integrity attacks, the owners may not be aware of the exact numbers of records modified. Till date there are 62% of the data integrity attacks where the exact number of records modified has not been exposed.

It is very important that organizations should not compromise in financial, systems and operations integrity which store sensitive data and it is very important to implement security team across an organization to address the security issues and notify actions to be implemented to protect attacks. According to a research, almost 47% of the organizations do not have proper measures or separate team assigned to monitor the security of their databases. Integrity attacks concentrate on altering the data and besides loss to the organization, the data altered in the health care and pharmaceutical sector can also endanger the life of the patients. Protecting Integrity, Confidentiality and availability in an organization is the standard for evaluating the information system. “The ultimate security aim is to provide confidentiality, integrity, authenticity and availability in the presence of resourceful adversaries” (Aminzade, 2018).

Irrespective of the private sectors where the integrity attacks mostly happen for ransom and in some cases even due to the rivalry between companies, federal organizations such as military, health care that store PII data are prone to security threats. Health sector tops in the risk of data breaches as each year hundreds of records are compromised. According to a publication in the year Oct 2017 by Identity Theft Research center (ITRC), there are “1,120 total breaches till date in the following year and almost 171 million records are exposed” (GRETEL EGAN, 2017) estimated financial loss of 6 billion . Organizations that face data breach end up losing revenue.

The most recent example of an issue made possible by the data integrity attack is in the news article by Charlie. On January 23rd 2020 an unsecured databased which is owned by THSuite a point-of-sale system of marijuana dispensaries across the U.S., has been uncovered online without any authentication or security in place. This breach exposed PHI of 30,000 records and almost 85,000 records are affected. Along with the PHI data, cannabis used, price and quantity are also exposed. “As a medical data breach, it may be that there could be consequences under the US Health Insurance Portability and Accountability Act (HIPAA) of 1996”(Charlie Osborne, 2020). The access to the data base has been revoked after a week of identifying the data breach. The financial loss has not been estimated yet.

Most of the data breaches come into light lately if the hacker has no intention of informing the organization about the data breach. As data integrity is hard to recover once altered it is always suggested to back up the data and also validate when it is gathered. Regular audits and limiting the access to the data by restricting the access to unauthorized parties can help in mitigating data breach issues to an extent.


Data is valuable, either it is of any organization or a health care unit. Data is of many types. Information needs to be kept in secure hands because it costs a lot when data integrity breaches. Cyber-attacks are making it more threatening to secure data appropriately. Not only in the regions of the United States but all over the world, organizations are facing the issue of increasing cyber-attacks. Even the data of health care units are not safe. Because in the recent few years, it observed that the confidential information of patients and their health record was theft.

Data integrity breaches due to some reasons. There may be a weak security system. A compromised information system may also cause a data integrity breach. Some of the double-faced employees of an organization may be a reason for the data breach. Many organizations cannot estimate the costs and risks associated with the data integrity breach. Data of any company or organization may use for some illegal purposes. Therefore, keeping it under a safeguard system may assist in managing it properly. The immune system of the organization’s information system should be strong enough that it must not be theft or threaten by an insider or outsider attack.

Now it is “clear that employee behaviors figure into a large number of data breaches” [1].it is not always the fault of devices that are held liable for data integrity breach. But sometimes a human error may cause data breach too. Almost 30% of the employee’s negligence causes a data integrity breach. It involves improper disposal of data, for granted security, unauthorized access to data systems, etc. According to the statics of 2017, more than 60% of data integrity breaches from malware, phishing, and cyber-attacks, etc.

Integrity monitoring assists in detecting the alteration an attacker made to the landscape of some company information or security system. Even via integrity monitoring, one may observe the activities for “targeting for a data security breach” [2]. It is essential to make file integrity. File integrity is also concern with regulations of the data breach. It detects the minor alterations that a red hacker has made to your landscape for some suspicious activity or attack. An integrity monitoring enables you to protect and correct all the changes made to your view by the hacker. Now the need is to put an action on the integrity control to do timely corrections in your landscape.

Yes, its army faced the data integrity breach too. It recorded that “DoD information leaked on to a public Amazon Web” [3]. According to record, a public server had almost 40 plus files that were viewable and downloadable containing confidential information. These 40 additional files contain information about intelligence and also have the data related to private keys. These keys used for accessing the hashed password and also disrupted intelligence too. Then a complete check and balance were put on the dissemination of information to the public.

Sample Solution
ne of the fundamental reasons that creature testing ought to be prohibited is the torment it exacts on guiltless creatures. The quantity of creatures it influences isn’t little either. As indicated by an examination directed in 2014, more than 100 million creatures are mishandled in U.S. labs every year (Adams and Larson). For experimentation, this maltreatment spread a decent arrangement of regions. Analysts are controlling creatures with either gadgets or by breaking certain body parts, for example, a pelvis or legs, to immobilize them. They embed terminals in the mind, which can cause cerebrum harm, just as conveying electro-stun, harming creatures for danger testing, and utilizing a few different methods for the sake of research. In beautifying agents a typical strategy is the Draize Eye test, used to assess bothering, in which organizations put their item in a creatures’ eye and hold their eyelids open for up to days on end so they can’t flicker the item away. Another standard test is the Lethal-Dose 50 (LD50) in which they find which portion of the medication executes half of creatures. An examination led by the USDA found that in 2010, 97,123 creatures experienced agony during these two tests alone, not having gotten any sedation for help (Allen). Xenotransplantation ( the transplantation of cells, tissues, or organs from one animal groups into another) has likewise become a famous trial to perform on creatures. This hereditary designing is making a decent arrangement of languishing over creatures and keeping in mind that the quantity of creatures’ lives it has taken is obscure, a significant number of these creatures will kick the bucket experiencing variations from the norm and other sick conditions. The measure of torment that is caused on these creatures for experimentation is terrible. Nobody in their correct personality could ever accomplish something like this to a human, and creatures ought to be dealt with no distinctively as they can feel torment equivalent to any human.>GET ANSWER Let’s block ads! (Why?)

Do you need any assistance with this question?
Send us your paper details now
We’ll find the best professional writer for you!


error: Content is protected !!