Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Law - IT law

Enhancing Data Security in Large Organizations. A Facebook Case Study

Title: Enhancing Data Security in Large Organizations. A Facebook Case Study

Case Study , 2023 , 30 Pages , Grade: A

Autor:in: Bandar Hezam (Author)

Law - IT law
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

This text delves deeply into the realm of cybersecurity, particularly focusing on the handling of sensitive data by large organizations, using Facebook as a case study. The goal is to foster an awareness of the significance of data protection and cybersecurity in today's digitalized world and how companies can enhance their data security strategies.

In the first chapter, a comprehensive introduction to the data and cybersecurity sphere is presented, discussing various data types and the importance of data protection and pertinent laws. It underscores the increasing sensitivity of data, especially Personal Identifiable Information (PII), and the escalating necessity for cybersecurity measures.

The second chapter zeroes in on the organization Facebook, starting with an overview of the company's background, followed by an analysis of data breaches that the company experienced in the past. It also explores the impacts these data breaches had on Facebook and the measures the company undertook in response to them.

The document concludes with recommendations on how organizations can optimize their cybersecurity strategies, followed by a conclusion that encapsulates the key findings.

Excerpt


Table of Contents

CHAPTER ONE

1.0 DATA & CYBERSECURITY

1.1 Data and Data Types

1.2 Importance of Data Protection and Data Laws

1.3 Cybersecurity

1.4 Importance of Cybersecurity

CHAPTER 2

2.0 CHOSEN ORGANISATION: FACEBOOK

2.1 Background of Facebook

2.2 Data Breaches in Facebook

2.3 Impact of the Data Breaches on Facebook

2.4 Actions in Response to the Data Breaches

RECOMMENDATIONS & CONCLUSION

Project Goals and Thematic Overview

This academic project aims to analyze the critical intersection of data protection regulations and cybersecurity practices, using Facebook as a primary case study to illustrate the real-world impact of data breaches and the subsequent institutional responses.

  • The theoretical underpinnings of data types and the global landscape of data protection legislation.
  • The practice and evolution of cybersecurity in a modern, digitized global environment.
  • An examination of Facebook’s historical data breaches and their organizational consequences.
  • Evaluation of corporate methodologies for incident response, breach communication, and mitigation strategies.

Excerpt from the Book

1.1 Data and Data Types

Data in respect to cybersecurity according to Seemma, Nandhini, and Sowmiya (2018) refers to any information which is collected, processed, stored, or transmitted through a computer system or over an internet network and with the evolution of technology and how the world has become more digitized, data has a higher sensitivity value as it consists of personal identifiable information often referred to as PII, financial data, health records, intellectual property, and other confidential information. Over the years, data has seen many revolutions in terms of the exponential growth of the volume of data with the increase in computer networks and connected devices and with the rise of Internet of Things (IoT), even infrastructures are being connected through the network which gives a higher rise of sensitive data handling in the today world with a variety of structured and unstructured data which makes it difficult to for the identification and classification of data. The cited authors emphasize on how nowadays data is being generated at a high speed which makes challenging even for trained systems to analyse and process data in real time considering that the world also had to make use of machine learning for data analysis and decision making.

It can hence be noted that with more data being generated on a daily basis and the higher the value of data gets in today’s world, the data is even more valuable for the future and hence data becomes prone to multiple cyber attacks and hence requires protection and data security. Some of the protocols adopted by small and big institutions globally are encryption, access controls, and intrusion detection systems. Some of the most common data types according to Wang and Jones (2021) are:

Summary of Chapters

1.0 DATA & CYBERSECURITY: Defines core data concepts and the necessity of cybersecurity measures to protect sensitive information against evolving global threats.

1.1 Data and Data Types: Categorizes various data formats, such as PII and health records, and explains the challenges of managing data volume and velocity.

1.2 Importance of Data Protection and Data Laws: Examines regulatory frameworks like GDPR and CCPA that mandate institutional accountability for data security.

1.3 Cybersecurity: Traces the historical shift from physical security to complex, network-based technological defenses against cyber threats.

1.4 Importance of Cybersecurity: Highlights the risks of data breaches, including financial loss, reputation damage, and national security threats.

2.0 CHOSEN ORGANISATION: FACEBOOK: Provides an overview of Facebook's corporate evolution and the platform's role in the global data ecosystem.

2.1 Background of Facebook: Details the history and growth trajectory of Facebook from a university project to a massive global entity.

2.2 Data Breaches in Facebook: Documents several high-profile security incidents involving unauthorized access to user data.

2.3 Impact of the Data Breaches on Facebook: Analyzes the repercussions of breaches, covering regulatory fines, loss of public trust, and reputational damage.

2.4 Actions in Response to the Data Breaches: Reviews the methodologies implemented by Facebook to contain, communicate, and remediate security vulnerabilities.

RECOMMENDATIONS & CONCLUSION: Summarizes findings and provides strategic suggestions for further strengthening Facebook's security posture.

Keywords

Cybersecurity, Data Protection, PII, GDPR, Data Breaches, Facebook, Cambridge Analytica, Encryption, Access Control, Incident Response, Network Security, Privacy, Information Technology, Digital Assets, Regulatory Compliance

Frequently Asked Questions

What is the primary focus of this project?

The project analyzes the relationship between data security protocols and organizational practices, specifically focusing on how large social media platforms like Facebook navigate data protection requirements and address breaches.

What are the central thematic fields explored?

The core themes include the definition and classification of data, the evolution of global cybersecurity laws, the anatomy of cyber-attacks, and corporate responsibility in safeguarding consumer information.

What is the core objective or research question?

The main objective is to evaluate how Facebook manages user data security in light of numerous high-profile breaches and to assess the effectiveness of their mitigation and communication strategies.

Which scientific or analytical methods were utilized?

The work employs a literature-based analysis, synthesizing information from existing cybersecurity frameworks, regulatory studies, and historical data regarding Facebook's security incidents.

What specific topics are covered in the main section?

The main section covers the types of sensitive data, international data protection laws, specific historical data breaches at Facebook, financial and reputational impacts, and the procedural responses to these incidents.

Which keywords best describe the work?

Key terms include Cybersecurity, Data Protection, PII, GDPR, Data Breaches, Facebook, Encryption, and Regulatory Compliance.

How does the "View As" vulnerability demonstrate systemic failure?

The "View As" incident illustrates how a feature intended to enhance user experience can be exploited by attackers via token theft to compromise the accounts of millions of users.

What is the significance of the Cambridge Analytica scandal for this study?

This scandal is a primary focus because it highlights the intersection of political influence, illicit data harvesting, and the severe regulatory and reputational penalties that follow such large-scale privacy violations.

What methodology does Facebook now adopt for breach management?

Following public scrutiny, Facebook implemented a structured approach involving breach identification, containment, notification of affected users, remediation of the technical root cause, and proactive stakeholder communication.

Excerpt out of 30 pages  - scroll top

Details

Title
Enhancing Data Security in Large Organizations. A Facebook Case Study
College
Munich University of Policy  (cyberjaya)
Course
MBA
Grade
A
Author
Bandar Hezam (Author)
Publication Year
2023
Pages
30
Catalog Number
V1392990
ISBN (PDF)
9783346939579
ISBN (Book)
9783346939586
Language
English
Tags
cyberlaw Cybersecurity Data Protection Facebook Data Breaches Personal Identifiable Information Data and Information Security
Product Safety
GRIN Publishing GmbH
Quote paper
Bandar Hezam (Author), 2023, Enhancing Data Security in Large Organizations. A Facebook Case Study, Munich, GRIN Verlag, https://www.grin.com/document/1392990
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  30  pages
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint