Data Loss and Restoration 32 Abstract Many companies that conduct business online

Data Loss and Restoration 32

Abstract

Many companies that conduct business online are currently dealing with data concerns, notably data breaches. The loss of critical files or the misplacement of organizational files and documents is referred to as data loss. A data breach causes various losses in a corporation, particularly financial losses, making the organization exceedingly hazardous when it comes to investing. Data loss in an organization can be identified as a result of computer infections and data erasure. IT professionals, on the other hand, present recovery options and data restoration, which are required for data backup. In this situation, the data can be restored in the event of a removal.

In final point, the research investigation discovered that various companies suffer a variety of data loss concerns. According to the survey that we made we can clearly say that the reasons of the loss of the data were human and mechanical mistakes. When an employee deletes data, crucial information or data is lost. Nevertheless, for this reason, an organization should hire a trained IT director who will be in charge of data backup.

Dedication

This project is dedicated to my baby, husband, and the memory of my father. My first child, you have made me stronger, happier, and more peaceful than I could have ever dreamed, Miguel, my husband, has been a great source of inspiration and motivation during the difficulties of my last semester at graduate school. I am very grateful to have you in my life. Although my father was my inspiration to pursue my master’s degree, he was unable to see my graduation. This is for them.

Acknowledgment

I am appreciative to everybody who has assisted me in the achievement of my aim of getting a Master’s Degree in Cybersecurity. I would like to start by thanking Zelalem Mengistu, our Professor, for his coaching, effort, and expertise in assisting with the execution of this Project. Thank you for your support and counseling us. I can’t even start to convey how grateful I am to my family for all of their support, encouragement, advice, and prayers that they have sent my direction during this path.

TABLE OF CONTENTS

CHAPTER

1.OVERVIEW

Introduction…………………………………………………………………………………………………7

Statement of The Problem …………………………………………………………………………….9

Statement of The Purpose……………………………………………………………….12

Research Questions………………………………………………………………………..13

Limitation…………………………………………………………………………………….14

Definition of The Terms…………………………………………………………………15

Organization of The Remaining Chapter…………………………………………16

2.LITERATURE REVIEW

Introduction…………………………………………………………………………………17

Conceptual Framework…………………………………………………………………17

Historical Background………………………………………………………………….19

Prior Studies………………………………………………………………………………..20

Research Gaps……………………………………………………………………………..20

Literature Review Summary………………………………………………………….21

3. METHODOLOGY

Introduction………………………………………………………………………………..22

The Rationale for the Research Approach……………………………………………………22

Unit Analysis……………………………………………………………………………..23

Trustworthiness…………………………………………………………………………..23

Reliability…………………………………………………………………………………..23

Summary……………………………………………………………………………………24

4. DATA ANALYSIS

Introduction……………………………………………………………………………26

Data collection……………………………………………………………………….26

Data analysis………………………………………………………………………….27

Findings………………………………………………………………………………..27

Summary………………………………………………………………………………28

5. DISCUSSION, CONCLUSIONS, AND RECOMMENDATIONS

Introduction………………………………………………………………………….29

Results Summary…………………………………………………………………..29

Limitations of The Study………………………………………………………..29

Recommendations…………………………………………………………………30

Conclusion…………………………………………………………………………..30

LIST OF FIGURES

FIG 1: The Error Causes’ Rates…………………………………………………………28

Chapter One

Overview

Introduction

Today, many firms that conduct business electronically are dealing with information security challenges, particularly data breaches. The high frequency of security breaches, along with significant financial losses, has caused organizations to be wary of investing in information technology (IT) (Chang et al., 2020). Data breach, often known as data loss, refers to the misplacing or loss of important company files and documents. Many of businesses lose data due to deletion and due to the presence of corrupted viruses in the system. While this has become an issue, some of the data that has been lost can be recovered by IT experts and specialists. Viruses and malware malicious software placed in the system to corrupt files is two significant variables contributing to data loss.

Second, data loss can occur due to human error, such as accidentally deleting a file and hacking activities, hard drive damage, insider threats, and ransomware (Cheng et al., 2017). As a result, data restoration and recovery solutions have been developed to restore lost data from another useable copy. Data erased due to human error can now be easily recovered using recovery tools embedded in the systems (A, 2018). To combat this issue, many restoration technologies have been used. As a result, it’s critical to assess the restore technique and the data recovery tools used to ensure that a trustworthy data backup version is accessible for restoration. Protection copies should be reviewed at random intervals to ensure that they meet recovery point objectives (RPOs).

The data being restored must be legible, consistent with a given time period, and have the necessary information to meet RPOs (Posey & Peterson, 2020). Even with businesses’ attention to data loss and restoration, incidences of data loss still occur. Historically, public disclosure of data breaches began in the 1980s, but it became more common in the early 2000s. The first data breach occurred in 1984 when TRW, global credit information corporation, was hacked, and around 90 million records were stolen (Sobers, 2021). A similar incident occurred in 1986 when 16 million records from Revenue Canada were taken. However, in 2005, a new pattern of data breaches emerged.

As individuals become more reliant on computers for transactions, shopping, and other activities, a single cyber-attack on a firm can have massive impact consumers. A data leak in the healthcare industry has affected around 249.09 people by the year 2019 (Seh et al., 2020). There were 2216 data breaches reported in 65 countries around the world in 2018. This research investigates the cause of data loss, prevention measures, and efficient data restoration techniques that can be applied in an organizational setting once a firm experience data loss (Seh et al., 2020). This research looks into certain gaps. First, the proposed data restoration technique and tools face challenges in backing up and recovery data.

Although studies have been conducted to evaluate data loss and data restoration techniques, no studies have been conducted to propose practical solutions for safer backup procedures. Previous research did not consider the follow-up techniques for data restoration and the steps to be taken once data is lost (Tessian, 2021). This will be taken into account in the research while attempting to identify recovery procedures. The following section will elaborate data loss problems by explaining how things should function, why the problem is important, supporting claims, possible solutions, and the solution’s benefits. The next sections will include the problem purpose, research question, study importance, limitation, definition of terms and organization of the remaining chapters.

Problem Statement

A strong data protection plan is one of the most important data security procedures for securing a company’s assets. Robust data security measures can help prevent data breaches and leaks caused by external influence or internal employee interaction. One of the most significant advantages of an efficient data protection protocol is the protection of a recognized firm’s reputation as one of the key challenge modern business faces (Wheatley & et al., 2019). The goal of a data protection plan is to prevent breaches, leakage, loss, or corruption. Data protection entails two components: data accessibility and data management. The data accessibility method comprises instant access and use of data required to do business, even if the data is distorted or deleted.

On the other hand, data management is the process of securely shifting vital data between online and offline storage. This method secures data from errors, corruption, breaches and attacks, hardware or software failure, and natural disasters. The reason for selecting this topic is that there has been a significant increase in data manipulation by hackers who damage files with dangerous software to extort or gain money. Many organizations spend large sums of money retrieving lost data and even managing their data files, which disrupts their day-to-day operations and results in losses (Wheatley & et al., 2019). Data breaches have both long and short-term consequences for businesses.

The short-term cost of a data breach includes missed sales and the materials and personnel required for data recovery, all of which may be assessed. Another short-term cost is a loss of investor trust in the company, which negatively impacts firms’ stock performance and price (Cheng et al., 2017). On the other hand, the long-term expenses are difficult to quantify because it is difficult to evaluate the loss of customer trust and the erosion of the organization’s reputation. According to Romanosky (2016, Wang et al., 2019), the average cost of a cyber-event is less than $200,000, which is less than the cost of the company’s annual sales.

The legal cost is 19%, the customer compensation cost is 18%, the third party remedial resources cost is 15%, the fine or compliance cost is 15%, and the public relations compensation cost is roughly 18% (Wang et al., 2019). Modern data system has some extra data layers on top of the usual operating and file system, which creates some issues when retrieving data. To get the old file system, the experts must reconstruct the logic on the system. This is a common issue with high-end enterprise products that determine where to store each file part (Marsaid et al., 2019). Creating proactive data security measures is crucial in combating data breaches.

Proactive security measures include developing security awareness training, penetration testing, proactive endpoint, network monitoring, threat hunting, and threat intelligence (Angelini & et al., 2015). Reactive cyber security is a comprehensive approach to cyber security that focuses on prevention rather than detection and response. It enables the organization to understand the areas of vulnerability better and minimize them. Reactive measures for cyber security risks are procedures put in place to prevent any attack before it occurs. The reactive measures include cyber security monitoring systems, forensic analysis of security events, anti-spam/anti-malware solution, and firewall (Angelini et al., 2015).

The best method to keep data and networks safe and secure is to use a combination of reactive and proactive measures. Another method that may be used to solve backup and recovery speed is to eliminate backup windows and minimize recovery timeframes (Angelini & et al., 2015). Data storage in the cloud makes financial sense since it eliminates the firm capital and operational costs involved with procuring new infrastructure. SaaS and cloud-native applications are two cloud options that can be used to store data. Symantec backup exec 2014 and Netbackup 7.6 can aid in the elimination of backup and recovery windows. The recommended solutions are advantageous since they would reduce the amount of time cyber security experts spend recovering data from damaged hard disk.

Cloud computing will ensure data is easily accessible via the cloud. Addressing cyber security threats through reactive and proactive methods ensures that vulnerability concerns on the firm system are recognized, suspicious behavior is identified, compliance is increased, and cyber security threats are prevented (Chang et al., 2020). Cyber security measures prevent data loss caused by employee error, hackers, or human error. In conclusion, data loss hazards caused by human error, cyber activity, or insider work severely damage an organization’s reputation and increased financial loss to the firm and customers (Chang et al., 2020). The time a company spends recovering data still consumes a considerable amount of productive time.

Proactive and reactive cyber security measures and automatic data recovery and storage in the cloud reduce data restoration complications and the potential of the data breach. This is due to the fact that data security threats and vulnerabilities will be recognized and avoided before they harm the company’s IT system.

Statement of Purpose

The main purpose of study is to discover and identify issues which make organization vulnerable to data loss. Qualitative research will be used to investigates the interaction between proactive and reactive cyber security measures, automatic data recovery, and cloud computing and their impact on data loss prevention and efficient data restoration in the workplace. The survey, questionnaire questions will be disseminated through emails using a pro-email management tool to deliver and collect surveys. The people interviewed include data security managers in the working setting.

The research will focus on collecting data on causes of data loss, prevention measures critical in preventing data loss, and appropriate data restoration techniques that would be effective in restoring data lost through hackers, damaged hard disks, and delete data by mistake and insider threats. The study will encompass 20 selected organizations’ data security managers in the retail, banking sector, and retail setting in the U.S. The personnel will respond to the interview, questionnaire, and survey questions on proactive and reactive measures, data recovery and restoration, and data loss cause.

Research Questions

The main research question that this study will examine is what preventative methods the company may implement to avoid data loss and is there an easier way to recover data.

The following are examples of potential research questions; however, they are not limited.

Research Q1:

Is there a statistically significant relationship between proactive and reactive cyber security measures, cloud computing, and automatic data recovery on preventing data loss and promoting efficient data restoration?

Research Q2:

Is there a significant relationship between regular risk assessment, staff training, updated software, third-party data security evaluation, and cloud computing in promoting effective data restoration and preventing data loss?

Research Q3.:

Is there an important relationship between encryption, regular update of the system, cloud computing, and their impact on preventing data loss and efficient data restoration?

Significance

This study is relevant as it will provide a thorough insight into the data backup and restoration, which has limited research that gives extensive information on what happens after the data is recovered and challenges that are faced during data restoration activity in the modern workplace setting. Furthermore, the study would be crucial in providing significant information relating to data prevention measures employed in the modern workplace and how modern organizations are actively assessing their system to detect vulnerability and measures they put in place. The information acquired will be crucial in expanding the body of knowledge on how automatic data recovery, cloud computing, and reactive and proactive methods will be used to prevent data loss and restore data efficiently in the workplace.

Limitation

The limitation of this study includes issues with small sample size of 20 data security managers. Statistical tests would fail to detect a meaningful link between data sets due to sample size used. A large sample size may yield accurate results. Time constraints and access to research participants is another concern that limited the research. The study depends on the access to data security managers for selected organizations and information on data security breaches, but some organizations denied access to certain information or comment, and some staffs were inaccessible due to busy work schedules. The time allocated to investigate the research problem and to access the independent and dependent variables was limited due to assignment due time.

Definition of Terms

Data Loss: Data loss is defined as a technique or event that causes data to be damaged, destroyed, or rendered inaccessible by a user, program, or application.

Malware-Malicious Software: is any application or document that poses a risk to a user.

Hard Drive Damages: When a system cannot successfully complete data to a file or when sections of the file become unreadable, hard disk data leakage occurs. It is a prevalent source of data loss since damaged files are frequently inaccessible.

Insider Threat: An insider threat is a potential threat that arises within the company being attacked.

Ransomware: Ransomware is a form of virus that prohibits or restricts users’ accessibility to their machine, either by locking the system’s screen or by encrypting the users’ documents until a ransom has been paid.

Recovery Point Objective (RPO): The volume of data which can be lost before severe damage happens between the time of a critical incident as well as the most recent backup is referred to as the Recovery Point Objective (RPO).

Cloud Computing: A concept for providing ubiquitous, easy, on-demand access to a common pool of customizable computing resources that can be swiftly provided and delivered with no administrative effort or involvement from service providers.

Software as a Service (SaaS): It is a software distribution method in which a cloud provider hosts programs and make them accessible to end customers through the internet.

Organization of the Remaining Chapter

The study will be presented in five chapters. Chapter 2 will provide a Review of Selected Literature. Chapter 3 then covers the description of the Completed Project which is Methodology. We are going to cover Data Analysis Methods in Chapter 4. Finally, the result of the research study will be provided in Chapter 5.

Chapter Two

Literature Review

Introduction

Data loss is an event where data is destroyed, deleted, corrupted, or made incomprehensible by operators and software applications. A data loss incident can be intentional or accidental (Palkó & Sujbert, 2021). Data loss results in some or all of the information becoming useless by the owner or its conforming software application. Data can be due to theft, computer virus, hardware impairment, power failure, or software corruption. The theft or loss of a device comprising data is reflected as part of data loss. Data restoration is the process of recovering data from any storage media after data loss. Data restoration incorporates a set of procedures used to recover lost information. The high occurrence of data loss experienced by technology users suggests it would be wise to reflect on your data recovery choices before trouble starts. Data loss is one of the most serious issues for organizations.

Conceptual Framework

Data loss is one of the most serious issues for organizations. Past research on data loss has essentially centered around two focuses; striving to reduce the chances of a data loss by addressing every employee by monitoring their behavior and considering the effects of data loss on organizations. Data loss has been one of the most ordinary worries for any business association that arrangements with general society. From the outcome, the idea of data loss has been changing gradually. One alarming outcome that had been gotten in our end study is, the data loss is straightforwardly ascribed to the implementation of safety arrangements that accounts for critical jobs. Eventually, the organizations should carry out rigid security arrangements and give vital and adequate preparation to authorize these strategies on the workers. Data Systems (IS) is the Centre space where associations should lead their business procedures and work with their partners (ONU & AKIENE). It is the fundamental responsibility of the organization to safeguard the and accessibility, trustworthiness, and privacy of the Information frameworks to work appropriately to have the confidence of partners towards the organization. It had an immense effect on IS because of the expanded number of data losses. Hence, the issues related to data security and secrecy have turned into the greatest concerns for businesses and supervisors.

For any organization, information violations are huge difficulties. Any unapproved access or inadvertent disclosure of delicate data brings about unfriendly results to the business’s reputation. In this manner, the business entity can be additionally forced fines because of administrative consistency and may even have lawful activity from clients, which thus expands the consumption for further developing security and may even prompt loss of client trust. The new study on data loss expresses that loss of information increases the expenses to the ordinary hierarchical expense of an organization’s data (Taylor, 2021). In this way, scientists need to research these issues and begin to analyze the issues identified with data loss.

Historical Background

Data loss has been happening since computer systems initially began showing up in working environments and started to notably rise during the 1980s. For instance, in 1984, the organization presently known as Experian had 90 million records lost in an attack. In 1986, there was another occurrence bringing about 16 million records being taken from Revenue Canada. Into the ’90s and mid-2000s, the quantity of data loss kept on expanding; however, so did public awareness (Hsia, 2021). Cyber theft turned into a generally normal media feature, and individuals and organizations started pushing for more grounded information protection arrangements.

During this time, legal elements likewise started to pay attention. For instance, in 2003, California passed the primary law securing buyers’ very own data protection. This law provoked numerous previously negligent associations regarding their approaches or lacking them completely to pay attention to data loss and start focusing on defensive measures. Regardless of this abrupt development of consideration, starting in 2012, states had laws managing how to deal with data loss. On the other hand, data restoration became effective in the 1970s due to the rise of technologies. Before this time, many businesses stored paper records that could be damaged by fire as well as theft. In 1980, the government of the United States ordered every bank to have a testable backup for their documents. In 1990, the three-tier architecture was used to separate data from the user interface and application layer (Hsia, 2021). Data recovery had evolved until the 2010s when cloud computing was discovered, and it has reduced disastrous loss of data as well as reducing the cost of data recovery.

Prior Studies

This study aims to see how data loss happens and its impacts, with the end goal that data loss can be easily stopped. Talesh (2018) stated that employees are the primary reason behind the cause of majority of the data loss. Their non-compliance with the rules of safety administered by the business organization is the principal reason. According to a study done by Zeno-Zencovich (2018), organizations are to forced intensely by fines when they track down that private information loss is informed. The most effective solution to data loss is a good data backup system, as it upsurges the probabilities of data restoration.

Data restoration is mostly done by specialized firms that inspect hardware storage to recover deleted information and the effort to restore corrupted data through specialized procedures. For example, ACE Data Recovery has been outshining since 1981, recuperating data from RAID arrays, hard drives, SSDs, and server data. What makes this agency exclusive is its capability to design and construct its hardware and software entirely for data restoration.

Research Gaps

Virus and formatting errors are the main causes of data loss from their storage. There is the need to put in place strategies that would help prevent the corruption of data that leads to total loss of data. Having data backup is the best way to distribute the risk of losing data. Research on ways that can be used to protect data from viruses and errors should be done to ensure that data is preserved and stored without the risk of loss. On data restoration and recovery, there are data filling algorithms that are essential in ensuring that data is not completely lost. A modification of these features would help in providing delete options before data is erased. Organizations need to upgrade systems and software before they get to the point of becoming unsteady due to age. Organizations should monitor data movement to identify patterns, determine the sensitive data, and define policies that should protect access to the data.

Literature Review Summary

Data loss has been happening since computer systems initially began showing up in working environments and started to notably rise during the 1980s. For instance, in 1984, the organization presently known as Experian had 90 million records lost in an attack. The objective of this study is to obviously see how data loss happens, its impacts, with the end goal that data loss can be easily stopped. Talesh (2018) stated that employees are the primary reason behind the cause of majority of the data loss. The most effective solution to data loss is a good data backup system, as it upsurges the probabilities of data restoration. Data restoration is mostly done by specialized firms that inspect hardware storage to recover deleted information and the effort to restore corrupted data through specialized procedures. 

According to Tran and Park (2020), data restoration is of prime significance. It solves the problem of data loss in organizations. Data restoration helps an organization resume its business operations without experiencing challenges (Tran & Park, 2020). Data backups are important strategies for ensuring business continuity. Tran &Park (2020) state that flash memory is one of the devices that could be used to restore data, and as a result, it overcomes the physical limitations of data loss and improves performance.

Chapter Three

Methodology

Introduction

Research strategies denote the instruments that one uses to conduct a research study. These can either be qualitative, quantitative, or blended. Surveys incorporate collecting data from large groups of people or companies by means of questionnaires, telephones, and interviews. Indeed, study exploration might be the main methodology in brain science where arbitrary testing is frequently used. Surveys can be long or short. They can be directed face to face, by phone calls, through the mail, or over the Internet social platforms. Despite the fact that overview data are regularly investigated utilizing insights, there are many inquiries that loan themselves to more qualitative research.

The Rationale for the Research Approach

In this research, the researcher used a mixed-method approach as it dove-tailed both qualitative and quantitative approaches to identify and analyze the impact of data loss and restoration on various business organizations. Qualitative analysis is a strategy that collects data using conversational strategies, generally open-ended questions. The qualitative analysis includes gathering and investigating theoretical information (Dewasiri, Weerakoon & Azeez, 2018). Participants will be presented with questionnaires where they will theoretically answer the presented questions. The reactions gathered are basically non-mathematical. This strategy assists an analyst with getting what members think and why they think with a certain goal in mind. Quantitative strategies examine mathematical information and regularly necessitate the application of factual devices to examine collected data. This reflects the approximation of factors and influences between them. The data obtained from the survey can be presented in diagrams and tables.

Unit Analysis

The population of the study comprised of participants selected randomly from different business organizations. Random sampling is used to select the participants from their specific organizations (Etikan & Bala, 2017). A name is chosen from a list of names of employees in each organization, and the chosen employee is given a chance to participate in the survey.

Trustworthiness

Various steps have to be followed to ensure the accuracy, credibility, and believability of the research. There should be the use of recording gadgets and well-detailed field notes, which will improve the dependability of the research (Cohen, Manion & Morrison, 2017). The survey agents ought to likewise act naturally basic. The outcome should also be an exact understanding of the member’s initial data. The research method should be of high value and targeted to ensure exactly what I need to measure. An increase of randomization during sample selection will also decrease sample bias.

Reliability

One of the key requirements of any research is the reliability of information and findings. In order to ensure research reliability, I will use various methods such as interviews, questionnaires, and classroom observation to gather information. Gathering different types of data from various sources will improve the reliability of my research. The Calculation of internal consistency, for instance, through having two dissimilar questions that have a similar focus, will also increase the reliability of my research. The use of control groups will increase the effectiveness of the research results.

Summary

Research strategies denote the instruments that one uses to conduct a research study. These can either be qualitative, quantitative, or blended. In my research, I will use surveying to collect data on the impacts of data loss and restoration. Surveys incorporate collecting data from a large group of people or companies by means of questionnaires, telephones, and interviews. In this research, quantitative and qualitative methods will be used to research on impacts of data loss and restoration on various business organizations. Qualitative analysis is a strategy that gathers information utilizing conversational strategies, generally open-ended questions. Quantitative strategies examine mathematical information and regularly necessitates the application of factual devices to examine collected data. This reflects the approximation of factors and influences between them.

The population of the study comprised of participants selected randomly from different business organizations. Random sampling is used to select the participants from their specific organizations. There should be the use of recording gadgets and well-detailed field notes, which will improve the dependability of the qualitative research. The research method should be of high value and targeted to ensure exactly what I need to measure. An increase of randomization during sample selection will also decrease sample bias.

Chapter Four

Data Analysis

Introduction

This chapter looks into various data collection methods collecting and analyzing data that has been used to arrive to the conclusion of the study. The main problem of this study is how companies are currently struggling with the issue on data loss. The data was collected from specific companies which aimed to assess their encounter with the issue of data loss. Interview and questionnaire methods were used to collect data from participants who were employees and managers of the selected companies.

The results of the data collected have been included in the chapter which have been used to answer the main research questions of the study. The report has considered both reactive and proactive measures in developing the conclusions.

Data collection

Random sampling method was used to pick participants from the top companies like Amazon, Google, Walmart, United Healthcare exc. This was done through picking the numbers form the list which contained various employees within the company. This was important as it meant to prevent any form of bias while picking the employees. No specific characteristics were used for the process.

The period of data collection was between September 10th 2021 and November 13th 2021. Employees and the managers were the main participants in the research. However, three experts who were not members of the companies were also interviewed.

Questionnaires which contained open-headed questions were issued to the participants. Those who were not found physically were contacted via the email where they were sent the questionnaire. All of them returned the filled questionnaire in time. Both qualitative and quantitative forms of data were also used in the research process. The qualitative data was captured and stored using the Microsoft Excel while Microsoft word was used to store quantitative data.

Data analysis

After collecting data from the field, it is important to use a proper data analysis method so that to allocate the collected data a meaning. (Lee & Hwang, 2020). Data analysis is a process of collecting, modeling and analyzing the collected data so that to assist others to understand into details what was being researched on.

Descriptive analysis method was applied so that to describe all processes used in data collection and analysis Blumenberg & Barros, 2018). However, exploratory analysis was the main data analysis method as the research aimed at finding connections and solutions to the problem of data loss in various institutions. Through predictive analysis, future implications of data loss to companies was done so that to look into potential problems that might face the companies in future.

Findings

A total of 200 participants were used in the data collection. Out of them, 180 of the participants were employees from the selected companies while 10 were external experts. Besides, 10 of the participants were holding managerial positions from the selected companies. The participants were asked to describe their encounter on what has been the main cause of data loss. They were expected to differentiate the causes of the error. The main categories that they were supposed to select between were human and mechanical error.

FIG 1: The Error Causes’ Rates

Summary

The results showed that when it comes to data loss that is influenced by human error, employees made majority of the errors which was 70% followed by the managers with 40%. The experts had the list made errors whose percentage was 25%. On the issues related to mechanical error, employees recorded 30% which was the list followed by managers with 60% percent. Experts recorded 75% which was the highest.

The results show that when it comes making human errors. Employees made the most errors while the experts made the list errors. Errors that occur due to mechanical problems were made mostly by the experts while employees recorded the list.

Chapter Five

Discussion, Conclusion, and Recommendations

Introduction

Currently, many organizations that operate business electronically deal with information challenges, specifically for data breaches. Therefore, data loss is what is usually referred to as data loss. It refers to the loss of essential files or misplacement of organizational files and documents. The data breach results in many losses in a company, especially a financial loss, which makes the firm very risky when it comes to investment. A data loss can be detected in an organization due to computer viruses and the deletion of the information. However, the IT experts introduce recovery solutions and data restoration that are used for data backup. In this case, the data can be retrieved again in case of any deletion.

Results Summary

Primarily, data loss is caused by human mistakes. The results showed that both employees and managers cause errors. Observation showed that 40% of errors are caused by the managers and 70% by the employees. Moreover, when it comes to mechanical errors, employees record very few errors compared to managers who record many errors. Therefore, the results show that data loss or information loss occurs as a result of human errors Gillson, et al. (2021).

Limitations of The Study

The study has limitations studies involve some issues that are of small sample size security managers. However, several things limit the research study. The first one is the statistical test which fails the essential links for data set up. The second thing determining the research study is the time constraints and the participant’s access to the research. However, the research study depends on the security manager’s data access for the selected company and the data information security breaches, even though some firms lack access to various information. Moreover, another challenge comes in due to time limitations used to investigate the research problem and the dependent and the independent variables. The other limitation is human error. Actually, this is one of the main cause of data loss in an organization. The firm should look for possible solution to minimize such type of errors that may led to deletion of the messages. The other limitation during the research study is software corruption. Human errors and software corruption has become a big challenge in the research study. Fei, et al. (2020)

Recommendations

The researcher suggestion concerning the research paper is that the research paper is to encourage every organization to be prepared for the data breach because it will eventually lead to the loss of vital information. An organization should hire an IT expert who installs the firm’s systems and computers so that when the data is deleted either intentionally or by mistake, it can be restored and retrieved back.

Conclusion

In conclusion, from the research study, the researcher have seen that several organizations face various challenges to data loss. Therefore, data loss occurs as a result of human and mechanical errors of both managers and employees. The employee deletes data loss important information or data. However, for this reason, a company should employ a qualified IT manager used for data backup.

References

A. (2018, February 2). Importance of Data Restoration. Secure Cloud Backup Software | Nordic Backup. https://nordic-backup.com/blog/importance-of-data-restoration/

Angelini, M., Prigent, N., & Santucci, G. (2015, October). PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics. In 2015 IEEE Symposium on Visualization for Cyber Security (VizSec) (pp. 1-8). IEEE.

Blumenberg, C., & Barros, A. J. (2018). Response rate differences between web and alternative data collection methods for public health research: a systematic review of the literature. International journal of public health, 63(6), 765-773.

Chang, K. C., Gao, Y. K., & Lee, S. C. (2020). The effect of data theft on a firm’s short-term and long-term market value. Mathematics, 8(5), 808.

Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1211.

Fei, Y., Huang, C., Jinkun, C., Li, M., Zhang, Y., & Lu, C. (2020). Attribute restoration framework for anomaly detection. IEEE Transactions on Multimedia. https://ieeexplore.ieee.org/abstract/document/9311201/

Gillson, L., Dirk, C., & Gell, P. (2021). Using long-term data to inform a decision pathway for restoration of ecosystem resilience. Anthropocene, 100315. https://www.sciencedirect.com/science/article/pii/S2213305421000382

Hsia, K. L. (2021). The Day the Computers Went Down. Annals of Surgery, 273(4), e138.

Lee, J., & Hwang, D. (2020). Single-cell multiomics: technologies and data analysis methods. Experimental & Molecular Medicine, 52(9), 1428-1442.

Marsaid, R. H. J., Huda, M., Lydia, E. L., & Shankar, K. (2019). Importance of data security in business management protection of company against security threats. Journal of Critical Reviews, 7(1), 2020.

ONU, F. U., & AKIENE, P. T. Data Loss Control In A Congested Network Using Computer Based Forecasting Techniques.

Palkó, A., & Sujbert, L. (2021, May). Adaptive Fourier Analysis in the Case of Data Loss. In 2021 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) (pp. 1-6). IEEE.

Posey, B., & Peterson, S. (2020, July 16). data restore. SearchDataBackup. https://searchdatabackup.techtarget.com/definition/restore

Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Ahmad Khan, R. (2020, June). Healthcare data breaches: Insights and implications. In Healthcare (Vol. 8, No. 2, p. 133). Multidisciplinary Digital Publishing Institute.

Sobers, R.(2021, April 16). 98 must-know data breach statistics for 2021.Veronis: Retrieved from https://www.varonis.com/blog/data-breach-statistics/

Talesh, S. A. (2018). Data breach, privacy, and cyber insurance: How insurance companies act as “compliance managers” for businesses. Law & Social Inquiry, 43(2), 417-440.

Taylor, A. R. E. (2021). Standing by for data loss: Failure, preparedness and the cloud. ephemera: theory & politics in organization, 21(1).

Tessian. (2021, April 28). The State of Data Loss Prevention 2020 | Tessian Research. https://www.tessian.com/research/the-state-of-data-loss-prevention-2020/

Tran, V. D., & Park, D. J. (2020). A survey of data recovery on flash memory. International Journal of Electrical & Computer Engineering (2088-8708), 10(1).

W. (2021, June 28). Data Loss: Causes, Effects & Prevention Methods. Consolidated Technologies, Inc. https://consoltech.com/blog/10-common-causes-of-data-loss/

Wang, P., D’Cruze, H., & Wood, D. (2019). Economic costs and impacts of business data breaches. Issues in Information Systems, 20(2).

Wheatley, S., Hofmann, A., & Sornette, D. (2019). Data breaches in the catastrophe framework & beyond. arXiv preprint arXiv:1901.00699

Zeno-Zencovich, V. (2018). Liability for data loss. In Research Handbook in Data Science and Law. Edward Elgar Publishing

The post Data Loss and Restoration 32 Abstract Many companies that conduct business online appeared first on PapersSpot.

CLAIM YOUR 30% OFF TODAY

X
Don`t copy text!
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
???? Hi, how can I help?