Calculation, Insurance and Risk Management for Data Breaches


This item is provided by the institution :
International Hellenic University
Repository :
IHU Repository
see item page
in the web site of the repository *

Semantic enrichment/homogenization by EKT

2016 (EN)
Calculation, Insurance and Risk Management for Data Breaches (EN)

Patias, Emmanouil - Panagiotis (EN)

School of Science and Technology, MSc in Information & Communication Technology Systems (EL)
Katos, Vasilis (EN)

Nowadays, information exchange, in any format, is a main process which takes place worldwide, especially due to the abrupt spread of the Internet Billions of I nternet users (physic al or virtual users) share their information via a chaotic grid, in which information may be t ransfe r r ed though numerous and various distinguish ed parts such as computers, servers, optical or coax cables, satellites etc. until it reaches the final destinat ion. Information can be stored on a local computer or on a server and be exchanged among network users . It is obvious that we are going to deal with the information protection which is processed, transmitted among users and stored in digital format . This practice of defending information is called Information Security , and incidents where information is stolen by an unauthorized user or system are called Data Breaches , and more often the victims are companies and organizations. The attackers target sensiti ve and private data that can be valuable or their infringement can cause reputation and opera tion issues to the organization or company. As a result, a vital necessity for every organization that stores and processes sensitive or private data is to cond uct research about countermeasures that can protect and ensure its overall business operation. However, there are many ambiguous and murky points when an organization does market research or wonder s about the security level within the organization and the overall protection that the organization offers with respect to data that it possesses. For that reason, a web application is required, which will advise a company owner or a security manager and will help him or her to clarify all these grey areas about the necessity or not of continuous, dedicated and increasing Information Security policies which would lead to the development of a Data Breach security product whose aim is to maximize an organization’s existing security and its confidence. (EN)


Data Breaches (EN)

Διεθνές Πανεπιστήμιο της Ελλάδος (EL)
International Hellenic University (EN)



*Institutions are responsible for keeping their URLs functional (digital file, item page in repository site)