Home | Title | Introduction | Background | Legal & Ethical | Security | Conclusion | Bibliography |
Further research in this area will require detailed analysis of the institution of possible solutions and their strengths and weaknesses, especially if these solutions are meant to protecting databases against all types of malware. Types of malware and their effects on computer systems should also be considered as a component of research. Retail security breaches prior to the ones that have taken place in Home Depot and Target should be studied for the purpose of using past methods of recovery from successful foreign hacking attempts. International relations between the United States and Europe, especially those of the modern-day period and those that rely on the heavy use of network communication, should be another focal point in future studies.
On a final note, consumers of the western continent and the retailers that they depend on for everyday living, are entitled to their rights of being protected equally under U.S. federal authority and security, whose efforts should not be compromised by unwarranted identity and credit and debit card theft involving dangerous people from other nations.