全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Cyberattack Ramifications, The Hidden Cost of a Security Breach

DOI: 10.4236/jis.2024.152007, PP. 87-105

Keywords: Artificial Intelligence (AI), Business Continuity, Case Studies, Copyright, Cost-Benefit Analysis, Credit Rating, Cyberwarfare, Cybersecurity Breaches, Data Breaches, Denial of Service (DOS), Devaluation of Trade Name, Disaster Recovery, Distributed Denial of Service (DDOS), Identity Theft, Increased Cost to Raise Debt, Insurance Premium, Intellectual Property, Operational Disrup-tion, Patent, Post-Breach Customer Protection, Recovery Point Objective (RPO), Recovery Time Objective (RTO), Regulatory Compliance, Risk Assessment, Service Level Agreement, Stuxnet, Trade Secret

Full-Text   Cite this paper   Add to My Lib

Abstract:

In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.

References

[1]  IBM Security (2023) Cost of a Data Breach Report 2023.
https://tinyurl.com/2s4dmzj6
[2]  Verison (2023) 2023 Data Breach Investigations Report. Reduce Risks with the 2023 Data Breach Investigation Report.
https://shorturl.at/fprD5
[3]  Cymulate (2023) Data Breaches Study: Methods, Implications, and Prevention Report.
[4]  CrowdStrike (2023) Threat Hunting Report.
https://shorturl.at/gnyHL
[5]  Deepwatch. (2023) ATI 2023 Annual Threat Report.
https://www.deepwatch.com/2023-deepwatch-ati-threat-report/
[6]  JupiterOne (2023) 2023 The State of Cyber Assets Report.
https://info.jupiterone.com/scar-2023
[7]  Powers, E., Fancher, D. and Silber, J. (2019) Beneath the Surface of a Cyberattack, a Deeper Look at Business Impacts. Deloitte.
https://bit.ly/3xHQGIg
[8]  Wang, P. and Park, S. (2017) Communication in Cybersecurity: A Public Communication Model for Business Data Breach Incident Handling. Issues in Information Systems, 18, 136-147.
https://iacis.org/iis/2017/2_iis_2017_136-147.pdf
[9]  Carnovale, S. (2021) Guardians of Intellectual Property in the 21st Century: The Global Supply Chain Industry. Rutgers Business School.
https://bit.ly/3NhMAv7
[10]  Saleem, H. and Naveed, M. (2020) SoK: Anatomy of Data Breaches. Proceedings on Privacy Enhancing Technologies, No. 4, 153-174.
https://bit.ly/3xBFyeB
https://doi.org/10.2478/popets-2020-0067
[11]  De Arroyabea, I. and De Arroyabea, J. (2023) The Severity and Effects of Cyber-Breaches in SMEs: A Machine Learning Approach. Enterprise Information Systems, 17, Article 1942997.
https://bit.ly/3y1P4cq
https://doi.org/10.1080/17517575.2021.1942997
[12]  Aguilar, L. (2015) The Need for Greater Focus on the Cybersecurity Challenges Facing Small and Midsize Businesses. U.S. Securities and Exchange Commission.
https://bit.ly/3HGj6Wn
[13]  Neto, N. (2020) A Case Study of the Capital One Data Breach. SSRN.
https://tinyurl.com/ypz9fern
[14]  Woods, D. and Moore, T. (2020) Does Insurance Have a Future in Governing Cybersecurity? IEEE Security & Privacy, 18, 21-27.
https://bit.ly/3mZf7up
https://doi.org/10.1109/MSEC.2019.2935702
[15]  Van Norman, G. (2017) Technology Transfer: From the Research Bench to Commercialization. JACC Basic to Translational Science, 2, 85-97.
https://bit.ly/39Ezk5W
https://doi.org/10.1016/j.jacbts.2017.01.003
[16]  Swift, O., Colon, R. and Davis, K. (2020) The Impact of Cyber Breaches on the Content of Cybersecurity Disclosures. Journal of Forensic and Investigative Accounting, 12, 197-212.
http://web.nacva.com/JFIA/Issues/JFIA-2020-No2-2.pdf
[17]  Swanson, M., et al. (2010) Contingency Planning Guide for Federal Information Systems. National Institute of Standards and Technology (NIST) Special Publication 800-34 Rev. 1.
https://bit.ly/3N2hcAj
[18]  Kwon, J. and Johnson, E. (2014) Security Practices and Regulatory Compliance in the Healthcare Industry. Journal of the American Medical Informatics Association, 20, 44-51.
https://bit.ly/3b37jVL
https://doi.org/10.1136/amiajnl-2012-000906
[19]  Shaheen, S. (2014) Offense-Defense Balance in Cyber Warfare. In: Kremer, J.F. and Müller, B., Eds., Cyberspace and International Relations, Springer, Berlin, Heidelberg, 77-93.
https://doi.org/10.1007/978-3-642-37481-4_5
[20]  Meisner, M. (2017) Financial Consequences of Cyber-Attacks Leading to Data Breaches in the Healthcare Sector. Copernican Journal of Finance & Accounting, 6, 63-73.
https://bit.ly/39CqANA
https://doi.org/10.12775/CJFA.2017.017

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133