SlideShare a Scribd company logo
1 of 1
Read
Chapter 11 –
According to the authors, privacy and security go hand in hand;
and hence, privacy cannot be protected without implementing
proper security controls and technologies. Today, organizations
must make not only reasonable efforts to offer protection of
privacy of data, but also must go much further as privacy
breaches are damaging to its customers, reputation, and
potentially could put the company out of business. As we
continue learning from our various professional areas of
practice, its no doubt that breaches have become an increasing
concern to many businesses and their future operations. Taking
Cyberattacks proliferation of 2011 into context, security experts
at Intel/McAfee discovered huge series of cyberattacks on the
networks of 72 organizations globally, including the United
Nations, governments and corporations.
Q2: From this research revelation in our chapter 11, briefly
state and name the countries and organizations identified as the
targeted victims?
Use APA Format

More Related Content

Similar to Read Chapter 11 – According to the authors, privacy and securi.docx

Chapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxChapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxbartholomeocoombs
 
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxCourse Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxmarilucorr
 
Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 kedsliemichal
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfHumphrey Humphrey
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk ReportAngela Gunn
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016Tim Grieveson
 
Security economics
Security economicsSecurity economics
Security economicsYansi Keim
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfVikashSinghBaghel1
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxPelorusTechnologies
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 

Similar to Read Chapter 11 – According to the authors, privacy and securi.docx (20)

Chapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxChapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docx
 
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxCourse Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
 
Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report
 
HPE Security Report 2016
HPE Security Report 2016HPE Security Report 2016
HPE Security Report 2016
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
Security economics
Security economicsSecurity economics
Security economics
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 

More from danas19

Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxdanas19
 
Recognizing Fallacies Constructing sound arguments requires .docx
Recognizing Fallacies Constructing sound arguments requires .docxRecognizing Fallacies Constructing sound arguments requires .docx
Recognizing Fallacies Constructing sound arguments requires .docxdanas19
 
Recognizing Written ArgumentFor this weeks discussion, Id like.docx
Recognizing Written ArgumentFor this weeks discussion, Id like.docxRecognizing Written ArgumentFor this weeks discussion, Id like.docx
Recognizing Written ArgumentFor this weeks discussion, Id like.docxdanas19
 
Recognizing the fact usernames passwords are the weakest link in.docx
Recognizing the fact usernames passwords are the weakest link in.docxRecognizing the fact usernames passwords are the weakest link in.docx
Recognizing the fact usernames passwords are the weakest link in.docxdanas19
 
Recognizing ArgumentsIn this assignment, you will apply key co.docx
Recognizing ArgumentsIn this assignment, you will apply key co.docxRecognizing ArgumentsIn this assignment, you will apply key co.docx
Recognizing ArgumentsIn this assignment, you will apply key co.docxdanas19
 
Recognition, Reification, and Practices of ForgettingEthica.docx
Recognition, Reification, and Practices of ForgettingEthica.docxRecognition, Reification, and Practices of ForgettingEthica.docx
Recognition, Reification, and Practices of ForgettingEthica.docxdanas19
 
Recipe Format for Café Laura (and HM courses)Header Information.docx
Recipe Format for Café Laura (and HM courses)Header Information.docxRecipe Format for Café Laura (and HM courses)Header Information.docx
Recipe Format for Café Laura (and HM courses)Header Information.docxdanas19
 
Recently, several flyers were found near the campus of the Universit.docx
Recently, several flyers were found near the campus of the Universit.docxRecently, several flyers were found near the campus of the Universit.docx
Recently, several flyers were found near the campus of the Universit.docxdanas19
 
Recently, Kathy Smith, a project manager for a large industrial cons.docx
Recently, Kathy Smith, a project manager for a large industrial cons.docxRecently, Kathy Smith, a project manager for a large industrial cons.docx
Recently, Kathy Smith, a project manager for a large industrial cons.docxdanas19
 
Recently your facility has had patient complaints about staff posing.docx
Recently your facility has had patient complaints about staff posing.docxRecently your facility has had patient complaints about staff posing.docx
Recently your facility has had patient complaints about staff posing.docxdanas19
 
Recently, I built a floating bed frame for my room. I watched a qu.docx
Recently, I built a floating bed frame for my room. I watched a qu.docxRecently, I built a floating bed frame for my room. I watched a qu.docx
Recently, I built a floating bed frame for my room. I watched a qu.docxdanas19
 
Recently, a US Circuit Court upheld the enforceability of Website .docx
Recently, a US Circuit Court upheld the enforceability of Website .docxRecently, a US Circuit Court upheld the enforceability of Website .docx
Recently, a US Circuit Court upheld the enforceability of Website .docxdanas19
 
Recently police departments across the nation has been accused o.docx
Recently police departments across the nation has been accused o.docxRecently police departments across the nation has been accused o.docx
Recently police departments across the nation has been accused o.docxdanas19
 
Recently Capital One experienced scandal1.  Understand what.docx
Recently Capital One experienced scandal1.  Understand what.docxRecently Capital One experienced scandal1.  Understand what.docx
Recently Capital One experienced scandal1.  Understand what.docxdanas19
 
Recall a time when you received bad news, either in your academic or.docx
Recall a time when you received bad news, either in your academic or.docxRecall a time when you received bad news, either in your academic or.docx
Recall a time when you received bad news, either in your academic or.docxdanas19
 
Recent genetics research on leadership by Dr. Richard Avey suggests .docx
Recent genetics research on leadership by Dr. Richard Avey suggests .docxRecent genetics research on leadership by Dr. Richard Avey suggests .docx
Recent genetics research on leadership by Dr. Richard Avey suggests .docxdanas19
 
Receiving funding from a grant or other source of funds is a great a.docx
Receiving funding from a grant or other source of funds is a great a.docxReceiving funding from a grant or other source of funds is a great a.docx
Receiving funding from a grant or other source of funds is a great a.docxdanas19
 
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docxReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docxdanas19
 
Received 9 December 2017 Revised 19 September 2018 Accepted.docx
Received 9 December 2017 Revised 19 September 2018 Accepted.docxReceived 9 December 2017 Revised 19 September 2018 Accepted.docx
Received 9 December 2017 Revised 19 September 2018 Accepted.docxdanas19
 
Recall that the goal of the Kyoto Protocol was to cut developed co.docx
Recall that the goal of the Kyoto Protocol was to cut developed co.docxRecall that the goal of the Kyoto Protocol was to cut developed co.docx
Recall that the goal of the Kyoto Protocol was to cut developed co.docxdanas19
 

More from danas19 (20)

Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
Recognizing Fallacies Constructing sound arguments requires .docx
Recognizing Fallacies Constructing sound arguments requires .docxRecognizing Fallacies Constructing sound arguments requires .docx
Recognizing Fallacies Constructing sound arguments requires .docx
 
Recognizing Written ArgumentFor this weeks discussion, Id like.docx
Recognizing Written ArgumentFor this weeks discussion, Id like.docxRecognizing Written ArgumentFor this weeks discussion, Id like.docx
Recognizing Written ArgumentFor this weeks discussion, Id like.docx
 
Recognizing the fact usernames passwords are the weakest link in.docx
Recognizing the fact usernames passwords are the weakest link in.docxRecognizing the fact usernames passwords are the weakest link in.docx
Recognizing the fact usernames passwords are the weakest link in.docx
 
Recognizing ArgumentsIn this assignment, you will apply key co.docx
Recognizing ArgumentsIn this assignment, you will apply key co.docxRecognizing ArgumentsIn this assignment, you will apply key co.docx
Recognizing ArgumentsIn this assignment, you will apply key co.docx
 
Recognition, Reification, and Practices of ForgettingEthica.docx
Recognition, Reification, and Practices of ForgettingEthica.docxRecognition, Reification, and Practices of ForgettingEthica.docx
Recognition, Reification, and Practices of ForgettingEthica.docx
 
Recipe Format for Café Laura (and HM courses)Header Information.docx
Recipe Format for Café Laura (and HM courses)Header Information.docxRecipe Format for Café Laura (and HM courses)Header Information.docx
Recipe Format for Café Laura (and HM courses)Header Information.docx
 
Recently, several flyers were found near the campus of the Universit.docx
Recently, several flyers were found near the campus of the Universit.docxRecently, several flyers were found near the campus of the Universit.docx
Recently, several flyers were found near the campus of the Universit.docx
 
Recently, Kathy Smith, a project manager for a large industrial cons.docx
Recently, Kathy Smith, a project manager for a large industrial cons.docxRecently, Kathy Smith, a project manager for a large industrial cons.docx
Recently, Kathy Smith, a project manager for a large industrial cons.docx
 
Recently your facility has had patient complaints about staff posing.docx
Recently your facility has had patient complaints about staff posing.docxRecently your facility has had patient complaints about staff posing.docx
Recently your facility has had patient complaints about staff posing.docx
 
Recently, I built a floating bed frame for my room. I watched a qu.docx
Recently, I built a floating bed frame for my room. I watched a qu.docxRecently, I built a floating bed frame for my room. I watched a qu.docx
Recently, I built a floating bed frame for my room. I watched a qu.docx
 
Recently, a US Circuit Court upheld the enforceability of Website .docx
Recently, a US Circuit Court upheld the enforceability of Website .docxRecently, a US Circuit Court upheld the enforceability of Website .docx
Recently, a US Circuit Court upheld the enforceability of Website .docx
 
Recently police departments across the nation has been accused o.docx
Recently police departments across the nation has been accused o.docxRecently police departments across the nation has been accused o.docx
Recently police departments across the nation has been accused o.docx
 
Recently Capital One experienced scandal1.  Understand what.docx
Recently Capital One experienced scandal1.  Understand what.docxRecently Capital One experienced scandal1.  Understand what.docx
Recently Capital One experienced scandal1.  Understand what.docx
 
Recall a time when you received bad news, either in your academic or.docx
Recall a time when you received bad news, either in your academic or.docxRecall a time when you received bad news, either in your academic or.docx
Recall a time when you received bad news, either in your academic or.docx
 
Recent genetics research on leadership by Dr. Richard Avey suggests .docx
Recent genetics research on leadership by Dr. Richard Avey suggests .docxRecent genetics research on leadership by Dr. Richard Avey suggests .docx
Recent genetics research on leadership by Dr. Richard Avey suggests .docx
 
Receiving funding from a grant or other source of funds is a great a.docx
Receiving funding from a grant or other source of funds is a great a.docxReceiving funding from a grant or other source of funds is a great a.docx
Receiving funding from a grant or other source of funds is a great a.docx
 
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docxReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
 
Received 9 December 2017 Revised 19 September 2018 Accepted.docx
Received 9 December 2017 Revised 19 September 2018 Accepted.docxReceived 9 December 2017 Revised 19 September 2018 Accepted.docx
Received 9 December 2017 Revised 19 September 2018 Accepted.docx
 
Recall that the goal of the Kyoto Protocol was to cut developed co.docx
Recall that the goal of the Kyoto Protocol was to cut developed co.docxRecall that the goal of the Kyoto Protocol was to cut developed co.docx
Recall that the goal of the Kyoto Protocol was to cut developed co.docx
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Read Chapter 11 – According to the authors, privacy and securi.docx

  • 1. Read Chapter 11 – According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations. Q2: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims? Use APA Format