Posted: February 6th, 2021
In Chapter 5, the interesting and controversial topic of cyber security is presented. As stated in the course textbook by Turban, Volonino, & Wood (2015), battling cyber threats is one of the costs of doing business in today’s globally-connected corporate environment. Distributed Denial-of-Service attacks (DDoS), malware infections, and other black-hat hacker generated security breaches have increased in frequency and pose even greater threats to government agencies, military organizations, and corporate enterprises. The U.S. Office of Personnel Management, Sony, Target, JP Morgan and eBay are just some of the entities that experienced major data breaches in 2015. The greatest theft of medical records ever occurred in 2015 at the health insurers Anthem and Primera. As Bloomberg Technology reported, “U.S. companies and government agencies suffered a record 1,093 data breaches” in 2016, “a 40 percent increase from 2015, according to the ” (Kharif, 2017). In 2016, Wendy’s fast food chain and the Democratic National Committee among others were victims of “headline-grabbing hacks” (Kharif, 2017). The 2017 “massive breach of one of the largest repositories of Americans’ most sensitive financial data” occurred in the attack on “dozens of sensitive databases” at Equifax (Riley, Robertson, & Sharpe, 2017). Of the great concern and receiving much media attention, is that regarding the potential for power-grid cyber attacks, something that would clearly undermine the safety and security of the world’s nations.
Turban, E., Volonino, L., & Wood, G. (2015). Information technology for management: Digital strategies for insight, action, and sustainable performance.(10th ed.). Hoboken, NJ: John Wiley & Sons Inc.
Conduct research on a recent threat or attack on a government agency, military organization, or corporate enterprise. Present data that describes the type of threat, the degree of harm caused by the threat, and describe who or what entity the perpetrator(s) might have been that could benefit from such an action. Give details on solutions that might have prevented the exploit and could be utilized to assist in mitigating or eliminating cyber threats in the future.
Place an order in 3 easy steps. Takes less than 5 mins.