SlideShare a Scribd company logo
1 of 1
According to the authors, privacy and security go hand in hand;
and hence, privacy cannot be protected without implementing
proper security controls and technologies. Today, organizations
must make not only reasonable efforts to offer protection of
privacy of data, but also must go much further as privacy
breaches are damaging to its customers, reputation, and
potentially could put the company out of business. As we
continue learning from our various professional areas of
practice, its no doubt that breaches have become an increasing
concern to many businesses and their future operations. Taking
Cyberattacks proliferation of 2011 into context, security experts
at Intel/McAfee discovered huge series of cyberattacks on the
networks of 72 organizations globally, including the United
Nations, governments and corporations.
Q2: From this research revelation in our chapter 11, briefly
state and name the countries and organizations identified as the
targeted victims?

More Related Content

Similar to According to the authors, privacy and security go hand in hand; .docx

Course Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxCourse Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
marilucorr
 
Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11
kedsliemichal
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Sarah Jarvis
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report
Angela Gunn
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016
Tim Grieveson
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
at MicroFocus Italy ❖✔
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 

Similar to According to the authors, privacy and security go hand in hand; .docx (20)

Course Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxCourse Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
 
Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report
 
HPE Security Report 2016
HPE Security Report 2016HPE Security Report 2016
HPE Security Report 2016
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
Security economics
Security economicsSecurity economics
Security economics
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 

More from SALU18

AFRICAResearch Paper AssignmentInstructionsOverview.docx
AFRICAResearch Paper AssignmentInstructionsOverview.docxAFRICAResearch Paper AssignmentInstructionsOverview.docx
AFRICAResearch Paper AssignmentInstructionsOverview.docx
SALU18
 
Advances In Management .docx
Advances In Management                                        .docxAdvances In Management                                        .docx
Advances In Management .docx
SALU18
 
Advocacy & Legislation in Early Childhood EducationAdvocacy & Le.docx
Advocacy & Legislation in Early Childhood EducationAdvocacy & Le.docxAdvocacy & Legislation in Early Childhood EducationAdvocacy & Le.docx
Advocacy & Legislation in Early Childhood EducationAdvocacy & Le.docx
SALU18
 
Advertising is one of the most common forms of visual persuasion we .docx
Advertising is one of the most common forms of visual persuasion we .docxAdvertising is one of the most common forms of visual persuasion we .docx
Advertising is one of the most common forms of visual persuasion we .docx
SALU18
 
Adult Health 1 Study GuideSensory Unit Chapters 63 & 64.docx
Adult Health 1 Study GuideSensory Unit Chapters 63 & 64.docxAdult Health 1 Study GuideSensory Unit Chapters 63 & 64.docx
Adult Health 1 Study GuideSensory Unit Chapters 63 & 64.docx
SALU18
 
Advertising Campaign Management Part 3Jennifer Sundstrom-F.docx
Advertising Campaign Management Part 3Jennifer Sundstrom-F.docxAdvertising Campaign Management Part 3Jennifer Sundstrom-F.docx
Advertising Campaign Management Part 3Jennifer Sundstrom-F.docx
SALU18
 
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docxAdopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
SALU18
 
ADM2302 M, N, P and Q Assignment # 4 Winter 2020 Page 1 .docx
ADM2302 M, N, P and Q  Assignment # 4 Winter 2020  Page 1 .docxADM2302 M, N, P and Q  Assignment # 4 Winter 2020  Page 1 .docx
ADM2302 M, N, P and Q Assignment # 4 Winter 2020 Page 1 .docx
SALU18
 
Adlerian-Based Positive Group Counseling Interventions w ith.docx
Adlerian-Based Positive Group Counseling Interventions w ith.docxAdlerian-Based Positive Group Counseling Interventions w ith.docx
Adlerian-Based Positive Group Counseling Interventions w ith.docx
SALU18
 
After completing the assessment, my Signature Theme Report produ.docx
After completing the assessment, my Signature Theme Report produ.docxAfter completing the assessment, my Signature Theme Report produ.docx
After completing the assessment, my Signature Theme Report produ.docx
SALU18
 
Advocacy Advoc.docx
Advocacy Advoc.docxAdvocacy Advoc.docx
Advocacy Advoc.docx
SALU18
 
Advanced persistent threats (APTs) have been thrust into the spotlig.docx
Advanced persistent threats (APTs) have been thrust into the spotlig.docxAdvanced persistent threats (APTs) have been thrust into the spotlig.docx
Advanced persistent threats (APTs) have been thrust into the spotlig.docx
SALU18
 
ADVANCE v.09212015 •APPLICANT DIVERSITY STATEMENT .docx
ADVANCE v.09212015 •APPLICANT DIVERSITY STATEMENT .docxADVANCE v.09212015 •APPLICANT DIVERSITY STATEMENT .docx
ADVANCE v.09212015 •APPLICANT DIVERSITY STATEMENT .docx
SALU18
 

More from SALU18 (20)

AFRICAResearch Paper AssignmentInstructionsOverview.docx
AFRICAResearch Paper AssignmentInstructionsOverview.docxAFRICAResearch Paper AssignmentInstructionsOverview.docx
AFRICAResearch Paper AssignmentInstructionsOverview.docx
 
Adversarial ProceedingsCritically discuss with your classmates t.docx
Adversarial ProceedingsCritically discuss with your classmates t.docxAdversarial ProceedingsCritically discuss with your classmates t.docx
Adversarial ProceedingsCritically discuss with your classmates t.docx
 
Advances In Management .docx
Advances In Management                                        .docxAdvances In Management                                        .docx
Advances In Management .docx
 
African-American Literature An introduction to major African-Americ.docx
African-American Literature An introduction to major African-Americ.docxAfrican-American Literature An introduction to major African-Americ.docx
African-American Literature An introduction to major African-Americ.docx
 
African American Women and Healthcare I want to explain how heal.docx
African American Women and Healthcare I want to explain how heal.docxAfrican American Women and Healthcare I want to explain how heal.docx
African American Women and Healthcare I want to explain how heal.docx
 
Advocacy & Legislation in Early Childhood EducationAdvocacy & Le.docx
Advocacy & Legislation in Early Childhood EducationAdvocacy & Le.docxAdvocacy & Legislation in Early Childhood EducationAdvocacy & Le.docx
Advocacy & Legislation in Early Childhood EducationAdvocacy & Le.docx
 
Advertising is one of the most common forms of visual persuasion we .docx
Advertising is one of the most common forms of visual persuasion we .docxAdvertising is one of the most common forms of visual persuasion we .docx
Advertising is one of the most common forms of visual persuasion we .docx
 
Adult Health 1 Study GuideSensory Unit Chapters 63 & 64.docx
Adult Health 1 Study GuideSensory Unit Chapters 63 & 64.docxAdult Health 1 Study GuideSensory Unit Chapters 63 & 64.docx
Adult Health 1 Study GuideSensory Unit Chapters 63 & 64.docx
 
Advertising Campaign Management Part 3Jennifer Sundstrom-F.docx
Advertising Campaign Management Part 3Jennifer Sundstrom-F.docxAdvertising Campaign Management Part 3Jennifer Sundstrom-F.docx
Advertising Campaign Management Part 3Jennifer Sundstrom-F.docx
 
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docxAdopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
 
ADM2302 M, N, P and Q Assignment # 4 Winter 2020 Page 1 .docx
ADM2302 M, N, P and Q  Assignment # 4 Winter 2020  Page 1 .docxADM2302 M, N, P and Q  Assignment # 4 Winter 2020  Page 1 .docx
ADM2302 M, N, P and Q Assignment # 4 Winter 2020 Page 1 .docx
 
Adlerian-Based Positive Group Counseling Interventions w ith.docx
Adlerian-Based Positive Group Counseling Interventions w ith.docxAdlerian-Based Positive Group Counseling Interventions w ith.docx
Adlerian-Based Positive Group Counseling Interventions w ith.docx
 
After completing the assessment, my Signature Theme Report produ.docx
After completing the assessment, my Signature Theme Report produ.docxAfter completing the assessment, my Signature Theme Report produ.docx
After completing the assessment, my Signature Theme Report produ.docx
 
After careful reading of the case material, consider and fully answe.docx
After careful reading of the case material, consider and fully answe.docxAfter careful reading of the case material, consider and fully answe.docx
After careful reading of the case material, consider and fully answe.docx
 
AffluentBe unique toConformDebatableDominantEn.docx
AffluentBe unique toConformDebatableDominantEn.docxAffluentBe unique toConformDebatableDominantEn.docx
AffluentBe unique toConformDebatableDominantEn.docx
 
Advocacy Advoc.docx
Advocacy Advoc.docxAdvocacy Advoc.docx
Advocacy Advoc.docx
 
Advanced persistent threats (APTs) have been thrust into the spotlig.docx
Advanced persistent threats (APTs) have been thrust into the spotlig.docxAdvanced persistent threats (APTs) have been thrust into the spotlig.docx
Advanced persistent threats (APTs) have been thrust into the spotlig.docx
 
Advanced persistent threatRecommendations for remediation .docx
Advanced persistent threatRecommendations for remediation .docxAdvanced persistent threatRecommendations for remediation .docx
Advanced persistent threatRecommendations for remediation .docx
 
Adultism refers to the oppression of young people by adults. The pop.docx
Adultism refers to the oppression of young people by adults. The pop.docxAdultism refers to the oppression of young people by adults. The pop.docx
Adultism refers to the oppression of young people by adults. The pop.docx
 
ADVANCE v.09212015 •APPLICANT DIVERSITY STATEMENT .docx
ADVANCE v.09212015 •APPLICANT DIVERSITY STATEMENT .docxADVANCE v.09212015 •APPLICANT DIVERSITY STATEMENT .docx
ADVANCE v.09212015 •APPLICANT DIVERSITY STATEMENT .docx
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 

According to the authors, privacy and security go hand in hand; .docx

  • 1. According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations. Q2: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?