HOW CYBER SECURITY CAN BE ENSURED WHILE REDUCING DATA BREACHES: PROS AND CONS OF MITIGATING A DATA BREACH?

Authors

  • Iqra Naseer Cyber Security IT Consultant, Doha, Qatar Author

Downloads

Abstract

This paper examines methods for improving cyberspace security and preventing subsequent data leaks, including encryption, MFA, updates, training, and segmentation. It assesses the advantages like accuracy, compliance, and customer confidence against giant negatives like expense, disruptions, and strict management. Another loophole is also discussed in the paper. These include changing threat models, the importance of insider threats, several issues of resource scarcity and the need for proportionality that point to the requirement for technical solutions alongside comprehensive policies and user training and awareness. In conclusion, it emphasizes the need for proper and innovative measures to prevent data hacking in a world that is becoming increasingly computerized.

Readership Data

🌐

Refreshing Cached Analytics Data

The cached analytics data has become stale and journal.thelawbrigade.com is making a fresh request to fetch the latest data from Google Analytics. This may take 20-30 seconds depending on the server response time from Google Analytics. Please do not close the browser during this time. We appreciate your patience.

Published

11-01-2023

License

Copyright © 2026 by Iqra Naseer

The copyright and license terms mentioned on this page take precedence over any other license terms mentioned on the article full text PDF or any other material associated with the article.

How to Cite

Naseer, Iqra. “HOW CYBER SECURITY CAN BE ENSURED WHILE REDUCING DATA BREACHES: PROS AND CONS OF MITIGATING A DATA BREACH?”. Cyber Law Reporter, vol. 2, no. 3, Jan. 2023, pp. 16-22, https://journal.thelawbrigade.com/cylr/article/view/921.