The Value of Personal Information

Document Type

Book Chapter

Publication Date

1-1-2016

Originally Published In

In E. de Silva (Ed.), National Security and Counterintelligence in the Era of Cyber Espionage. Hershey, PA: Information Science Reference

Page Numbers

161-180

Abstract

Many cyber-attacks that result in data loss can be prevented if the target of the cyber-attack is properly prepared, has the necessary and latest defenses in place, and is constantly monitoring for attacks and intrusions. Whether those cyber-attacks occur as a result of user error; network issues (password files being created and distributed to a list of people); direct assaults (direct intrusion via a designed hack, system flaw, or exploitation of a known network/software issue); or due to an insider-threat (giving a password to a trusted co-worker who then uses it for other means) one aspect of prevention that must be addressed is the need for better security and additional layers of protection on the data that resides on the servers and in computing systems. With up-to-date protocols, reduced access to the system, and compartmentalization of information, it is possible to reduce the amount and type of data that is lost in many cyber-attacks. This chapter explores five types of information that are targeted during cyber-attacks, and discuss why this information is of importance.

Share

COinS