You are going to prepare Literature review . This is the format that you need to focus.Adding relevant themes from credible sourcesArgument is well structured.Work referenced supports the argumentArgument supports the proposed workSections:IntroductionReview and discussion of the conceptual frameworkHistorical BackgroundPrior studies on specific area of studyResearch GapsSummary of Literature review
You are going to prepare Literature review . This is the format that you need to focus. Adding relevant themes from credible sources Argument is well structured. Work referenced supports the argument
Impact of Data Loss in the Organization and Waste of Restoration 16 Impact of Data Loss in the Organization and of Restoration Chapter One Introduction Overview Today, many firms that conduct business electronically are dealing with information security challenges, particularly data breaches. The high frequency of security breaches, along with significant financial losses, has caused organizations to be wary of investing in information technology (IT) (Chang et al., 2020). Data breach, often known as data loss, refers to the misplacing or loss of important company files and documents. Many of businesses lose data due to deletion and due to the presence of corrupted viruses in the system. While this has become an issue, some of the data that has been lost can be recovered by IT experts and specialists. Viruses and malware malicious software placed in the system to corrupt files is two significant variables contributing to data loss. Second, data loss can occur due to human error, such as accidentally deleting a file and hacking activities, hard drive damage, insider threats, and ransomware (Cheng et al., 2017). As a result, data restoration and recovery solutions have been developed to restore lost data from another useable copy. Data erased due to human error can now be easily recovered using recovery tools embedded in the systems (A, 2018). To combat this issue, many restoration technologies have been used. As a result, it’s critical to assess the restore technique and the data recovery tools used to ensure that a trustworthy data backup version is accessible for restoration. Protection copies should be reviewed at random intervals to ensure that they meet recovery point objectives (RPOs). The data being restored must be legible, consistent with a given time period, and have the necessary information to meet RPOs (Posey & Peterson, 2020). Even with businesses’ attention to data loss and restoration, incidences of data loss still occur. Historically, public disclosure of data breaches began in the 1980s, but it became more common in the early 2000s. The first data breach occurred in 1984 when TRW, global credit information corporation, was hacked, and around 90 million records were stolen (Sobers, 2021). A similar incident occurred in 1986 when 16 million records from Revenue Canada were taken. However, in 2005, a new pattern of data breaches emerged. As individuals become more reliant on computers for transactions, shopping, and other activities, a single cyber-attack on a firm can have massive impact consumers. A data leak in the healthcare industry has affected around 249.09 people by the year 2019 (Seh et al., 2020). There were 2216 data breaches reported in 65 countries around the world in 2018. This research investigates the cause of data loss, prevention measures, and efficient data restoration techniques that can be applied in an organizational setting once a firm experience data loss (Seh et al., 2020). This research looks into certain gaps. First, the proposed data restoration technique and tools face challenges in backing up and recovery data. Although studies have been conducted to evaluate data loss and data restoration techniques, no studies have been conducted to propose practical solutions for safer backup procedures. Previous research did not consider the follow-up techniques for data restoration and the steps to be taken once data is lost (Tessian, 2021). This will be taken into account in the research while attempting to identify recovery procedures. The following section will elaborate data loss problems by explaining how things should function, why the problem is important, supporting claims, possible solutions, and the solution’s benefits. The next sections will include the problem purpose, research question, study importance, limitation, definition of terms and organization of the remaining chapters. Problem Statement A strong data protection plan is one of the most important data security procedures for securing a company’s assets. Robust data security measures can help prevent data breaches and leaks caused by external influence or internal employee interaction. One of the most significant advantages of an efficient data protection protocol is the protection of a recognized firm’s reputation as one of the key challenge modern business faces (Wheatley & et al., 2019). The goal of a data protection plan is to prevent breaches, leakage, loss, or corruption. Data protection entails two components: data accessibility and data management. The data accessibility method comprises instant access and use of data required to do business, even if the data is distorted or deleted. On the other hand, data management is the process of securely shifting vital data between online and offline storage. This method secures data from errors, corruption, breaches and attacks, hardware or software failure, and natural disasters. The reason for selecting this topic is that there has been a significant increase in data manipulation by hackers who damage files with dangerous software to extort or gain money. Many organizations spend large sums of money retrieving lost data and even managing their data files, which disrupts their day-to-day operations and results in losses (Wheatley & et al., 2019). Data breaches have both long and short-term consequences for businesses. The short-term cost of a data breach includes missed sales and the materials and personnel required for data recovery, all of which may be assessed. Another short-term cost is a loss of investor trust in the company, which negatively impacts firms’ stock performance and price (Cheng et al., 2017). On the other hand, the long-term expenses are difficult to quantify because it is difficult to evaluate the loss of customer trust and the erosion of the organization’s reputation. According to Romanosky (2016, Wang et al., 2019), the average cost of a cyber-event is less than $200,000, which is less than the cost of the company’s annual sales. The legal cost is 19%, the customer compensation cost is 18%, the third party remedial resources cost is 15%, the fine or compliance cost is 15%, and the public relations compensation cost is roughly 18% (Wang et al., 2019). Modern data system has some extra data layers on top of the usual operating and file system, which creates some issues when retrieving data. To get the old file system, the experts must reconstruct the logic on the system. This is a common issue with high-end enterprise products that determine where to store each file part (Marsaid et al., 2019). Creating proactive data security measures is crucial in combating data breaches. Proactive security measures include developing security awareness training, penetration testing, proactive endpoint, network monitoring, threat hunting, and threat intelligence (Angelini & et al., 2015). Reactive cyber security is a comprehensive approach to cyber security that focuses on prevention rather than detection and response. It enables the organization to understand the areas of vulnerability better and minimize them. Reactive measures for cyber security risks are procedures put in place to prevent any attack before it occurs. The reactive measures include cyber security monitoring systems, forensic analysis of security events, anti-spam/anti-malware solution, and firewall (Angelini et al., 2015). The best method to keep data and networks safe and secure is to use a combination of reactive and proactive measures. Another method that may be used to solve backup and recovery speed is to eliminate backup windows and minimize recovery timeframes (Angelini & et al., 2015). Data storage in the cloud makes financial sense since it eliminates the firm capital and operational costs involved with procuring new infrastructure. SaaS and cloud-native applications are two cloud options that can be used to store data. Symantec backup exec 2014 and Netbackup 7.6 can aid in the elimination of backup and recovery windows. The recommended solutions are advantageous since they would reduce the amount of time cyber security experts spend recovering data from damaged hard disk. Cloud computing will ensure data is easily accessible via the cloud. Addressing cyber security threats through reactive and proactive methods ensures that vulnerability concerns on the firm system are recognized, suspicious behavior is identified, compliance is increased, and cyber security threats are prevented (Chang et al., 2020). Cyber security measures prevent data loss caused by employee error, hackers, or human error. In conclusion, data loss hazards caused by human error, cyber activity, or insider work severely damage an organization’s reputation and increased financial loss to the firm and customers (Chang et al., 2020). The time a company spends recovering data still consumes a considerable amount of productive time. Proactive and reactive cyber security measures and automatic data recovery and storage in the cloud reduce data restoration complications and the potential of the data breach. This is due to the fact that data security threats and vulnerabilities will be recognized and avoided before they harm the company’s IT system. Statement of Purpose The main purpose of study is to discover and identify issues which make organization vulnerable to data loss. Qualitative research will be used to investigates the interaction between proactive and reactive cyber security measures, automatic data recovery, and cloud computing and their impact on data loss prevention and efficient data restoration in the workplace. The survey, questionnaire questions will be disseminated through emails using a pro-email management tool to deliver and collect surveys. The people interviewed include data security managers in the working setting. The research will focus on collecting data on causes of data loss, prevention measures critical in preventing data loss, and appropriate data restoration techniques that would be effective in restoring data lost through hackers, damaged hard disks, and delete data by mistake and insider threats. The study will encompass 20 selected organizations’ data security managers in the retail, banking sector, and retail setting in the U.S. The personnel will respond to the interview, questionnaire, and survey questions on proactive and reactive measures, data recovery and restoration, and data loss cause. Research Questions The main research question that this study will examine is what preventative methods the company may implement to avoid data loss and is there an easier way to recover data. The following are examples of potential research questions; however, they are not limited. Research Q1: Is there a statistically significant relationship between proactive and reactive cyber security measures, cloud computing, and automatic data recovery on preventing data loss and promoting efficient data restoration? Research Q2: Is there a significant relationship between regular risk assessment, staff training, updated software, third-party data security evaluation, and cloud computing in promoting effective data restoration and preventing data loss? Research Q3.: Is there an important relationship between encryption, regular update of the system, cloud computing, and their impact on preventing data loss and efficient data restoration? Significance This study is relevant as it will provide a thorough insight into the data backup and restoration, which has limited research that gives extensive information on what happens after the data is recovered and challenges that are faced during data restoration activity in the modern workplace setting. Furthermore, the study would be crucial in providing significant information relating to data prevention measures employed in the modern workplace and how modern organizations are actively assessing their system to detect vulnerability and measures they put in place. The information acquired will be crucial in expanding the body of knowledge on how automatic data recovery, cloud computing, and reactive and proactive methods will be used to prevent data loss and restore data efficiently in the workplace. Limitation The limitation of this study includes issues with small sample size of 20 data security managers. Statistical tests would fail to detect a meaningful link between data sets due to sample size used. A large sample size may yield accurate results. Time constraints and access to research participants is another concern that limited the research. The study depends on the access to data security managers for selected organizations and information on data security breaches, but some organizations denied access to certain information or comment, and some staffs were inaccessible due to busy work schedules. The time allocated to investigate the research problem and to access the independent and dependent variables was limited due to assignment due time. Definition of Terms Data Loss: Data loss is defined as a technique or event that causes data to be damaged, destroyed, or rendered inaccessible by a user, program, or application. Malware-Malicious Software: is any application or document that poses a risk to a user. Hard Drive Damages: When a system cannot successfully complete data to a file or when sections of the file become unreadable, hard disk data leakage occurs. It is a prevalent source of data loss since damaged files are frequently inaccessible. Insider Threat: An insider threat is a potential threat that arises within the company being attacked. Ransomware: Ransomware is a form of virus that prohibits or restricts users’ accessibility to their machine, either by locking the system’s screen or by encrypting the users’ documents until a ransom has been paid. Recovery Point Objective (RPO): The volume of data which can be lost before severe damage happens between the time of a critical incident as well as the most recent backup is referred to as the Recovery Point Objective (RPO). Cloud Computing: A concept for providing ubiquitous, easy, on-demand access to a common pool of customizable computing resources that can be swiftly provided and delivered with no administrative effort or involvement from service providers. Software as a Service (SaaS): It is a software distribution method in which a cloud provider hosts programs and make them accessible to end customers through the internet. Organization of the Remaining Chapter The study will be presented in five chapters. Chapter 2 will provide a Review of Selected Literature. Chapter 3 then covers the description of the Completed Project which is Methodology. We are going to cover Data Analysis Methods in Chapter 4. Finally, the result of the research study will be provided in Chapter 5. References A. (2018, February 2). Importance of Data Restoration. Secure Cloud Backup Software | Nordic Backup. Angelini, M., Prigent, N., & Santucci, G. (2015, October). PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics. In 2015 IEEE Symposium on Visualization for Cyber Security (VizSec) (pp. 1-8). IEEE. Chang, K. C., Gao, Y. K., & Lee, S. C. (2020). The effect of data theft on a firm’s short-term and long-term market value. Mathematics, 8(5), 808. Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1211. Marsaid, R. H. J., Huda, M., Lydia, E. L., & Shankar, K. (2019). Importance of data security in business management protection of company against security threats. Journal of Critical Reviews, 7(1), 2020. Posey, B., & Peterson, S. (2020, July 16). data restore. SearchDataBackup. Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Ahmad Khan, R. (2020, June). Healthcare data breaches: Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133). Multidisciplinary Digital Publishing Institute. Sobers, R.(2021, April 16). 98 must-know data breach statistics for 2021.Veronis: Retrieved from Tessian. (2021, April 28). The State of Data Loss Prevention 2020 | Tessian Research. W. (2021, June 28). Data Loss: Causes, Effects & Prevention Methods. Consolidated Technologies, Inc. Wang, P., D’Cruze, H., & Wood, D. (2019). Economic costs and impacts of business data breaches. Issues in Information Systems, 20(2). Wheatley, S., Hofmann, A., & Sornette, D. (2019). Data breaches in the catastrophe framework & beyond. arXiv preprint arXiv:1901.00699.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.