SlideShare a Scribd company logo
1 of 2
Select a specific event that has recently occurred (within the last 30 days) such as a hacking
incident, data breach. This post should be two (2) to three (3) paragraphs. The post must include
at least one reference. (A very recent incident)
Solution
The timing of the attacks coincided with the reporting for a Times investigation, published online
on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had
accumulated a fortune worth several billion dollars through business dealings.
Security experts hired by The Times to detect and block the computer attacks gathered digital
evidence that Chinese hackers, using methods that some consultants have associated with the
Chinese military in the past, breached The Times’s network. They broke into the e-mail
accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s
relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously
worked as bureau chief in Beijing.
“Computer security experts found no evidence that sensitive e-mails or files from the
reporting of our articles about the Wen family were accessed, downloaded or copied,― said
Jill Abramson, executive editor of The Times.
The hackers tried to cloak the source of the attacks on The Times by first penetrating computers
at United States universities and routing the attacks through them, said computer security experts
at Mandiant, the company hired by The Times. This matches the subterfuge used in many other
attacks that Mandiant has tracked to China.
The attackers first installed malware — malicious software — that enabled them to gain entry
to any computer on The Times’s network. The malware was identified by computer security
experts as a specific strain associated with computer attacks originating in China. More evidence
of the source, experts said, is that the attacks started from the same university computers used by
the Chinese military to attack United States military contractors in the past.
Security experts found evidence that the hackers stole the corporate passwords for every Times
employee and used those to gain access to the personal computers of 53 employees, most of
them outside The Times’s newsroom. Experts found no evidence that the intruders used the
passwords to seek information that was not related to the reporting on the Wen family
Select a specific event that has recently occurred (within the last 30.docx

More Related Content

Similar to Select a specific event that has recently occurred (within the last 30.docx

Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxacarolyn
 
Chinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plantChinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plantRohanMistry15
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxannrodgerson
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
Gmail Hacking in China
Gmail Hacking in ChinaGmail Hacking in China
Gmail Hacking in ChinaHGM1
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Kate Neal
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxAssignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxMerrileeDelvalle969
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoJonas Mercier
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...wookyluvr
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataParsons Behle & Latimer
 
Threat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptxThreat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptxMALCOMNORONHA1
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxmattinsonjanel
 

Similar to Select a specific event that has recently occurred (within the last 30.docx (20)

Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
 
Chinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plantChinese Cyber attack on mumbai power plant
Chinese Cyber attack on mumbai power plant
 
Cyber Risk
Cyber RiskCyber Risk
Cyber Risk
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Gmail Hacking in China
Gmail Hacking in ChinaGmail Hacking in China
Gmail Hacking in China
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxAssignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Threat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptxThreat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
 

More from acarolyn

Research the issues that you might face as a network administrator whe.docx
Research the issues that you might face as a network administrator whe.docxResearch the issues that you might face as a network administrator whe.docx
Research the issues that you might face as a network administrator whe.docxacarolyn
 
Reset Help By the Brnsted-Lowry definition- acids are proton donors an.docx
Reset Help By the Brnsted-Lowry definition- acids are proton donors an.docxReset Help By the Brnsted-Lowry definition- acids are proton donors an.docx
Reset Help By the Brnsted-Lowry definition- acids are proton donors an.docxacarolyn
 
reverse the linked list (2-4-8-10) by- stack- iteration- recursion- U.docx
reverse the linked list (2-4-8-10) by- stack- iteration- recursion-  U.docxreverse the linked list (2-4-8-10) by- stack- iteration- recursion-  U.docx
reverse the linked list (2-4-8-10) by- stack- iteration- recursion- U.docxacarolyn
 
SECTION III- SHORT ANSWER (10 possible points) Please give a brief ans.docx
SECTION III- SHORT ANSWER (10 possible points) Please give a brief ans.docxSECTION III- SHORT ANSWER (10 possible points) Please give a brief ans.docx
SECTION III- SHORT ANSWER (10 possible points) Please give a brief ans.docxacarolyn
 
Scientifically continuous phase apersed phase Speaking Chapter Review.docx
Scientifically continuous phase apersed phase Speaking Chapter Review.docxScientifically continuous phase apersed phase Speaking Chapter Review.docx
Scientifically continuous phase apersed phase Speaking Chapter Review.docxacarolyn
 
Scenario- You are the Accountant for WanneBee Corporation WannaBee Cor.docx
Scenario- You are the Accountant for WanneBee Corporation WannaBee Cor.docxScenario- You are the Accountant for WanneBee Corporation WannaBee Cor.docx
Scenario- You are the Accountant for WanneBee Corporation WannaBee Cor.docxacarolyn
 
Scenario Allen Manesfield- Jenny Winters- and John Jacobsen have been.docx
Scenario Allen Manesfield- Jenny Winters- and John Jacobsen have been.docxScenario Allen Manesfield- Jenny Winters- and John Jacobsen have been.docx
Scenario Allen Manesfield- Jenny Winters- and John Jacobsen have been.docxacarolyn
 
S10-2 (Learning Objective 1- Describe the authority structure in a cor.docx
S10-2 (Learning Objective 1- Describe the authority structure in a cor.docxS10-2 (Learning Objective 1- Describe the authority structure in a cor.docx
S10-2 (Learning Objective 1- Describe the authority structure in a cor.docxacarolyn
 
rovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docxrovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docxacarolyn
 
Regarding intermolecular forces Sometimes London dispersion forces ou.docx
Regarding intermolecular forces  Sometimes London dispersion forces ou.docxRegarding intermolecular forces  Sometimes London dispersion forces ou.docx
Regarding intermolecular forces Sometimes London dispersion forces ou.docxacarolyn
 
Questions 12-14 refer to the following aqueous solutions- (A) 1 M BaCl.docx
Questions 12-14 refer to the following aqueous solutions- (A) 1 M BaCl.docxQuestions 12-14 refer to the following aqueous solutions- (A) 1 M BaCl.docx
Questions 12-14 refer to the following aqueous solutions- (A) 1 M BaCl.docxacarolyn
 
Reed Pentak a finance major has been following globalization and made.docx
Reed Pentak a finance major has been following globalization and made.docxReed Pentak a finance major has been following globalization and made.docx
Reed Pentak a finance major has been following globalization and made.docxacarolyn
 
Redesign- Make a prediction relating heat to the movement of molecules.docx
Redesign- Make a prediction relating heat to the movement of molecules.docxRedesign- Make a prediction relating heat to the movement of molecules.docx
Redesign- Make a prediction relating heat to the movement of molecules.docxacarolyn
 
Recycling and composting are important parts of an overall management.docx
Recycling and composting are important parts of an overall management.docxRecycling and composting are important parts of an overall management.docx
Recycling and composting are important parts of an overall management.docxacarolyn
 
R5232- RS422- 20mA Current Loop and 1EE488 are typical standard interf.docx
R5232- RS422- 20mA Current Loop and 1EE488 are typical standard interf.docxR5232- RS422- 20mA Current Loop and 1EE488 are typical standard interf.docx
R5232- RS422- 20mA Current Loop and 1EE488 are typical standard interf.docxacarolyn
 
RADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docxRADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docxacarolyn
 
Question- Federal funding agencies must form committees to decide whic.docx
Question- Federal funding agencies must form committees to decide whic.docxQuestion- Federal funding agencies must form committees to decide whic.docx
Question- Federal funding agencies must form committees to decide whic.docxacarolyn
 

More from acarolyn (17)

Research the issues that you might face as a network administrator whe.docx
Research the issues that you might face as a network administrator whe.docxResearch the issues that you might face as a network administrator whe.docx
Research the issues that you might face as a network administrator whe.docx
 
Reset Help By the Brnsted-Lowry definition- acids are proton donors an.docx
Reset Help By the Brnsted-Lowry definition- acids are proton donors an.docxReset Help By the Brnsted-Lowry definition- acids are proton donors an.docx
Reset Help By the Brnsted-Lowry definition- acids are proton donors an.docx
 
reverse the linked list (2-4-8-10) by- stack- iteration- recursion- U.docx
reverse the linked list (2-4-8-10) by- stack- iteration- recursion-  U.docxreverse the linked list (2-4-8-10) by- stack- iteration- recursion-  U.docx
reverse the linked list (2-4-8-10) by- stack- iteration- recursion- U.docx
 
SECTION III- SHORT ANSWER (10 possible points) Please give a brief ans.docx
SECTION III- SHORT ANSWER (10 possible points) Please give a brief ans.docxSECTION III- SHORT ANSWER (10 possible points) Please give a brief ans.docx
SECTION III- SHORT ANSWER (10 possible points) Please give a brief ans.docx
 
Scientifically continuous phase apersed phase Speaking Chapter Review.docx
Scientifically continuous phase apersed phase Speaking Chapter Review.docxScientifically continuous phase apersed phase Speaking Chapter Review.docx
Scientifically continuous phase apersed phase Speaking Chapter Review.docx
 
Scenario- You are the Accountant for WanneBee Corporation WannaBee Cor.docx
Scenario- You are the Accountant for WanneBee Corporation WannaBee Cor.docxScenario- You are the Accountant for WanneBee Corporation WannaBee Cor.docx
Scenario- You are the Accountant for WanneBee Corporation WannaBee Cor.docx
 
Scenario Allen Manesfield- Jenny Winters- and John Jacobsen have been.docx
Scenario Allen Manesfield- Jenny Winters- and John Jacobsen have been.docxScenario Allen Manesfield- Jenny Winters- and John Jacobsen have been.docx
Scenario Allen Manesfield- Jenny Winters- and John Jacobsen have been.docx
 
S10-2 (Learning Objective 1- Describe the authority structure in a cor.docx
S10-2 (Learning Objective 1- Describe the authority structure in a cor.docxS10-2 (Learning Objective 1- Describe the authority structure in a cor.docx
S10-2 (Learning Objective 1- Describe the authority structure in a cor.docx
 
rovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docxrovide 34 paragraphs that define how the IT security landscape has evo.docx
rovide 34 paragraphs that define how the IT security landscape has evo.docx
 
Regarding intermolecular forces Sometimes London dispersion forces ou.docx
Regarding intermolecular forces  Sometimes London dispersion forces ou.docxRegarding intermolecular forces  Sometimes London dispersion forces ou.docx
Regarding intermolecular forces Sometimes London dispersion forces ou.docx
 
Questions 12-14 refer to the following aqueous solutions- (A) 1 M BaCl.docx
Questions 12-14 refer to the following aqueous solutions- (A) 1 M BaCl.docxQuestions 12-14 refer to the following aqueous solutions- (A) 1 M BaCl.docx
Questions 12-14 refer to the following aqueous solutions- (A) 1 M BaCl.docx
 
Reed Pentak a finance major has been following globalization and made.docx
Reed Pentak a finance major has been following globalization and made.docxReed Pentak a finance major has been following globalization and made.docx
Reed Pentak a finance major has been following globalization and made.docx
 
Redesign- Make a prediction relating heat to the movement of molecules.docx
Redesign- Make a prediction relating heat to the movement of molecules.docxRedesign- Make a prediction relating heat to the movement of molecules.docx
Redesign- Make a prediction relating heat to the movement of molecules.docx
 
Recycling and composting are important parts of an overall management.docx
Recycling and composting are important parts of an overall management.docxRecycling and composting are important parts of an overall management.docx
Recycling and composting are important parts of an overall management.docx
 
R5232- RS422- 20mA Current Loop and 1EE488 are typical standard interf.docx
R5232- RS422- 20mA Current Loop and 1EE488 are typical standard interf.docxR5232- RS422- 20mA Current Loop and 1EE488 are typical standard interf.docx
R5232- RS422- 20mA Current Loop and 1EE488 are typical standard interf.docx
 
RADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docxRADIUS provides three services- authentication- authorization- and acc.docx
RADIUS provides three services- authentication- authorization- and acc.docx
 
Question- Federal funding agencies must form committees to decide whic.docx
Question- Federal funding agencies must form committees to decide whic.docxQuestion- Federal funding agencies must form committees to decide whic.docx
Question- Federal funding agencies must form committees to decide whic.docx
 

Recently uploaded

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Select a specific event that has recently occurred (within the last 30.docx

  • 1. Select a specific event that has recently occurred (within the last 30 days) such as a hacking incident, data breach. This post should be two (2) to three (3) paragraphs. The post must include at least one reference. (A very recent incident) Solution The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings. Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously worked as bureau chief in Beijing. “Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,― said Jill Abramson, executive editor of The Times. The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China. The attackers first installed malware — malicious software — that enabled them to gain entry to any computer on The Times’s network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack United States military contractors in the past. Security experts found evidence that the hackers stole the corporate passwords for every Times employee and used those to gain access to the personal computers of 53 employees, most of them outside The Times’s newsroom. Experts found no evidence that the intruders used the passwords to seek information that was not related to the reporting on the Wen family