Nowadays, information exchange, in any format, is a main process which takes place
worldwide, especially due to the abrupt spread of the Internet
Billions of I
nternet users
(physic
al or virtual users) share their information via a chaotic
grid, in which information
may be t
ransfe
r
r
ed
though numerous and various distinguish
ed
parts such as
computers,
servers, optical
or coax cables, satellites etc. until
it reaches the final destinat
ion.
Information can
be
stored on a
local
computer or on a server
and
be
exchanged among
network users
. It is obvious that we are going to deal with the information protection
which
is
processed, transmitted among users
and stored in
digital
format
. This
practice of
defending information is called Information Security
,
and
incidents where information is
stolen by an unauthorized user or system are called Data Breaches
,
and more often the
victims are companies and organizations.
The attackers target sensiti
ve and private data
that can be valuable or their infringement can cause reputation and opera
tion issues to the
organization or
company.
As a result, a vital necessity for every organization that
stores and processes sensitive or
private data is to cond
uct research about countermeasures that can protect and ensure its
overall business operation.
However, there are many ambiguous and murky points when
an organization does market research or wonder
s
about the security level within
the
organization and the
overall protection that the organization offers with respect to data
that it possesses.
For that reason, a web application is required, which will
advise
a
company owner or a security manager and will help him or her to clarify all these grey
areas about
the necessity or not of continuous, dedicated and increasing
Information
Security policies which would lead to the development of a Data Breach security
product
whose aim is to
maximize an organization’s existing security and its confidence.
Collections
Show Collections