SlideShare a Scribd company logo
1 of 2
In Chapter 5, the interesting and controversial topic of cyber
security is presented. As stated in the course textbook by
Turban, Volonino, & Wood (2015), battling cyber threats is one
of the costs of doing business in today’s globally-connected
corporate environment. Distributed Denial-of-Service attacks
(DDoS), malware infections, and other black-hat hacker
generated security breaches have increased in frequency and
pose even greater threats to government agencies, military
organizations, and corporate enterprises. The U.S. Office of
Personnel Management, Sony, Target, JP Morgan and eBay are
just some of the entities that experienced major data breaches in
2015. The greatest theft of medical records ever occurred in
2015 at the health insurers Anthem and Primera. As Bloomberg
Technology reported, "U.S. companies and government agencies
suffered a record 1,093 data breaches" in 2016, "a 40 percent
increase from 2015, according to the
Identity Theft Resource Center (Links to an external site.)Links
to an external site.
" (Kharif, 2017). In 2016, Wendy's fast food chain and the
Democratic National Committee among others were victims of
"headline-grabbing hacks" (Kharif, 2017). The 2017 "massive
breach of one of the largest repositories of Americans' most
sensitive financial data" occurred in the attack on "dozens of
sensitive databases" at Equifax (Riley, Robertson, & Sharpe,
2017). Of the great concern and receiving much media attention,
is that regarding the potential for power-grid cyber attacks,
something that would clearly undermine the safety and security
of the world’s nations.
References
Riley, M., Robertson, J., & Sharpe, A. (2017, September 29).
The Equifax hack has the hallmarks of state-sponsored pros.
Bloomberg Businessweek.
Retrieved from
https://www.bloomberg.com/news/features/2017-09-29/the-
equifax-hack-has-all-the-hallmarks-of-state-sponsored-
pros (Links to an external site.)Links to an external site.
Sharif, O. (2017, January 19). 2016 was a record year for data
breaches.
Bloomberg Technology.
Retrieved from
https://www.bloomberg.com/news/articles/2017-01-19/data-
breaches-hit-record-in-2016-as-dnc-wendy-s-co-hacked (Links
to an external site.)Links to an external site.
Turban, E., Volonino, L., & Wood, G. (2015).
Information technology for management: Digital strategies for
insight, action, and sustainable performance.
(10th ed.). Hoboken, NJ: John Wiley & Sons Inc.
Written Assignment:
Conduct research on a recent threat or attack on a government
agency, military organization, or corporate enterprise. Present
data that describes the type of threat, the degree of harm caused
by the threat, and describe who or what entity the perpetrator(s)
might have been that could benefit from such an action. Give
details on solutions that might have prevented the exploit and
could be utilized to assist in mitigating or eliminating cyber
threats in the future.

More Related Content

Similar to In Chapter 5, the interesting and controversial topic of cyber secur.docx

Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxhelen23456789
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016thinkASG
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceBrian Arellanes
 
Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Valerie Lanzone
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexAndreanne Clarke
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosHaltdos
 
CJUS 610Servant Leadership Project InstructionsBased on your o.docx
CJUS 610Servant Leadership Project InstructionsBased on your o.docxCJUS 610Servant Leadership Project InstructionsBased on your o.docx
CJUS 610Servant Leadership Project InstructionsBased on your o.docxmccormicknadine86
 
CJUS 610Servant Leadership Project InstructionsBased on your o.docx
CJUS 610Servant Leadership Project InstructionsBased on your o.docxCJUS 610Servant Leadership Project InstructionsBased on your o.docx
CJUS 610Servant Leadership Project InstructionsBased on your o.docxsleeperharwell
 
Corporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friCorporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friAlleneMcclendon878
 

Similar to In Chapter 5, the interesting and controversial topic of cyber secur.docx (20)

Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
HE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSourceHE Mag_New Cyber Threats_ITSource
HE Mag_New Cyber Threats_ITSource
 
Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence Index
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
 
Estado del ransomware en 2020
Estado del ransomware en 2020Estado del ransomware en 2020
Estado del ransomware en 2020
 
CJUS 610Servant Leadership Project InstructionsBased on your o.docx
CJUS 610Servant Leadership Project InstructionsBased on your o.docxCJUS 610Servant Leadership Project InstructionsBased on your o.docx
CJUS 610Servant Leadership Project InstructionsBased on your o.docx
 
CJUS 610Servant Leadership Project InstructionsBased on your o.docx
CJUS 610Servant Leadership Project InstructionsBased on your o.docxCJUS 610Servant Leadership Project InstructionsBased on your o.docx
CJUS 610Servant Leadership Project InstructionsBased on your o.docx
 
Corporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friCorporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best fri
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 

More from dunningblair

Write about one of the photographers from the list below.William.docx
Write about one of the photographers from the list below.William.docxWrite about one of the photographers from the list below.William.docx
Write about one of the photographers from the list below.William.docxdunningblair
 
Write about the measure, including what construct the measure report.docx
Write about the measure, including what construct the measure report.docxWrite about the measure, including what construct the measure report.docx
Write about the measure, including what construct the measure report.docxdunningblair
 
Write about Current state of E. I. Du Pont De Nemours and Company an.docx
Write about Current state of E. I. Du Pont De Nemours and Company an.docxWrite about Current state of E. I. Du Pont De Nemours and Company an.docx
Write about Current state of E. I. Du Pont De Nemours and Company an.docxdunningblair
 
Write about your childhood.  What are some of the pleasant memories .docx
Write about your childhood.  What are some of the pleasant memories .docxWrite about your childhood.  What are some of the pleasant memories .docx
Write about your childhood.  What are some of the pleasant memories .docxdunningblair
 
Write a well written business plan with a table of contents for Ma.docx
Write a well written business plan with a table of contents for Ma.docxWrite a well written business plan with a table of contents for Ma.docx
Write a well written business plan with a table of contents for Ma.docxdunningblair
 
Write a two page paper, to include an introduction and conclusion as.docx
Write a two page paper, to include an introduction and conclusion as.docxWrite a two page paper, to include an introduction and conclusion as.docx
Write a two page paper, to include an introduction and conclusion as.docxdunningblair
 
Write a well-developed essay of at least 4-5 solid, long paragraphs .docx
Write a well-developed essay of at least 4-5 solid, long paragraphs .docxWrite a well-developed essay of at least 4-5 solid, long paragraphs .docx
Write a well-developed essay of at least 4-5 solid, long paragraphs .docxdunningblair
 
Write a two page introduction of Virtual Reality. I have the paper w.docx
Write a two page introduction of Virtual Reality. I have the paper w.docxWrite a two page introduction of Virtual Reality. I have the paper w.docx
Write a two page introduction of Virtual Reality. I have the paper w.docxdunningblair
 
Write a two paragraph message to post in the Effective Speakers disc.docx
Write a two paragraph message to post in the Effective Speakers disc.docxWrite a two paragraph message to post in the Effective Speakers disc.docx
Write a two paragraph message to post in the Effective Speakers disc.docxdunningblair
 
Write a three-part PAPER.  Part I  Show or discuss the existing a.docx
Write a three-part PAPER.  Part I  Show or discuss the existing a.docxWrite a three-part PAPER.  Part I  Show or discuss the existing a.docx
Write a three-part PAPER.  Part I  Show or discuss the existing a.docxdunningblair
 
Write a summary of the fallowing Chapters 4, 5, 7, & 8 from the bo.docx
Write a summary of the fallowing Chapters 4, 5, 7, & 8 from the bo.docxWrite a summary of the fallowing Chapters 4, 5, 7, & 8 from the bo.docx
Write a summary of the fallowing Chapters 4, 5, 7, & 8 from the bo.docxdunningblair
 
Write a thorough review of gifted education history and policy for t.docx
Write a thorough review of gifted education history and policy for t.docxWrite a thorough review of gifted education history and policy for t.docx
Write a thorough review of gifted education history and policy for t.docxdunningblair
 
Write a three to four (3-4) page paper in which the student answer.docx
Write a three to four (3-4) page paper in which the student answer.docxWrite a three to four (3-4) page paper in which the student answer.docx
Write a three to four (3-4) page paper in which the student answer.docxdunningblair
 
Write a three (3) page paper (750 words) about visiting The MET .docx
Write a three (3) page paper (750 words) about visiting The MET .docxWrite a three (3) page paper (750 words) about visiting The MET .docx
Write a three (3) page paper (750 words) about visiting The MET .docxdunningblair
 
Write a single page-Word document answering the following questions.docx
Write a single page-Word document answering the following questions.docxWrite a single page-Word document answering the following questions.docx
Write a single page-Word document answering the following questions.docxdunningblair
 
Write a summary of  the fallowing the articleLaden, B. V. (1.docx
Write a summary of  the fallowing the articleLaden, B. V. (1.docxWrite a summary of  the fallowing the articleLaden, B. V. (1.docx
Write a summary of  the fallowing the articleLaden, B. V. (1.docxdunningblair
 
Write a summary of the fallowing Attachmentsthe discussi.docx
Write a summary of the fallowing Attachmentsthe discussi.docxWrite a summary of the fallowing Attachmentsthe discussi.docx
Write a summary of the fallowing Attachmentsthe discussi.docxdunningblair
 
Write a small discussion in only 2 pages of the following questions.docx
Write a small discussion in only 2 pages of the following questions.docxWrite a small discussion in only 2 pages of the following questions.docx
Write a small discussion in only 2 pages of the following questions.docxdunningblair
 
Write a short paper on the followingRelative to all of the issu.docx
Write a short paper on the followingRelative to all of the issu.docxWrite a short paper on the followingRelative to all of the issu.docx
Write a short paper on the followingRelative to all of the issu.docxdunningblair
 
Write a short (half page) paragraph for each question and be s.docx
Write a short (half page) paragraph for each question and be s.docxWrite a short (half page) paragraph for each question and be s.docx
Write a short (half page) paragraph for each question and be s.docxdunningblair
 

More from dunningblair (20)

Write about one of the photographers from the list below.William.docx
Write about one of the photographers from the list below.William.docxWrite about one of the photographers from the list below.William.docx
Write about one of the photographers from the list below.William.docx
 
Write about the measure, including what construct the measure report.docx
Write about the measure, including what construct the measure report.docxWrite about the measure, including what construct the measure report.docx
Write about the measure, including what construct the measure report.docx
 
Write about Current state of E. I. Du Pont De Nemours and Company an.docx
Write about Current state of E. I. Du Pont De Nemours and Company an.docxWrite about Current state of E. I. Du Pont De Nemours and Company an.docx
Write about Current state of E. I. Du Pont De Nemours and Company an.docx
 
Write about your childhood.  What are some of the pleasant memories .docx
Write about your childhood.  What are some of the pleasant memories .docxWrite about your childhood.  What are some of the pleasant memories .docx
Write about your childhood.  What are some of the pleasant memories .docx
 
Write a well written business plan with a table of contents for Ma.docx
Write a well written business plan with a table of contents for Ma.docxWrite a well written business plan with a table of contents for Ma.docx
Write a well written business plan with a table of contents for Ma.docx
 
Write a two page paper, to include an introduction and conclusion as.docx
Write a two page paper, to include an introduction and conclusion as.docxWrite a two page paper, to include an introduction and conclusion as.docx
Write a two page paper, to include an introduction and conclusion as.docx
 
Write a well-developed essay of at least 4-5 solid, long paragraphs .docx
Write a well-developed essay of at least 4-5 solid, long paragraphs .docxWrite a well-developed essay of at least 4-5 solid, long paragraphs .docx
Write a well-developed essay of at least 4-5 solid, long paragraphs .docx
 
Write a two page introduction of Virtual Reality. I have the paper w.docx
Write a two page introduction of Virtual Reality. I have the paper w.docxWrite a two page introduction of Virtual Reality. I have the paper w.docx
Write a two page introduction of Virtual Reality. I have the paper w.docx
 
Write a two paragraph message to post in the Effective Speakers disc.docx
Write a two paragraph message to post in the Effective Speakers disc.docxWrite a two paragraph message to post in the Effective Speakers disc.docx
Write a two paragraph message to post in the Effective Speakers disc.docx
 
Write a three-part PAPER.  Part I  Show or discuss the existing a.docx
Write a three-part PAPER.  Part I  Show or discuss the existing a.docxWrite a three-part PAPER.  Part I  Show or discuss the existing a.docx
Write a three-part PAPER.  Part I  Show or discuss the existing a.docx
 
Write a summary of the fallowing Chapters 4, 5, 7, & 8 from the bo.docx
Write a summary of the fallowing Chapters 4, 5, 7, & 8 from the bo.docxWrite a summary of the fallowing Chapters 4, 5, 7, & 8 from the bo.docx
Write a summary of the fallowing Chapters 4, 5, 7, & 8 from the bo.docx
 
Write a thorough review of gifted education history and policy for t.docx
Write a thorough review of gifted education history and policy for t.docxWrite a thorough review of gifted education history and policy for t.docx
Write a thorough review of gifted education history and policy for t.docx
 
Write a three to four (3-4) page paper in which the student answer.docx
Write a three to four (3-4) page paper in which the student answer.docxWrite a three to four (3-4) page paper in which the student answer.docx
Write a three to four (3-4) page paper in which the student answer.docx
 
Write a three (3) page paper (750 words) about visiting The MET .docx
Write a three (3) page paper (750 words) about visiting The MET .docxWrite a three (3) page paper (750 words) about visiting The MET .docx
Write a three (3) page paper (750 words) about visiting The MET .docx
 
Write a single page-Word document answering the following questions.docx
Write a single page-Word document answering the following questions.docxWrite a single page-Word document answering the following questions.docx
Write a single page-Word document answering the following questions.docx
 
Write a summary of  the fallowing the articleLaden, B. V. (1.docx
Write a summary of  the fallowing the articleLaden, B. V. (1.docxWrite a summary of  the fallowing the articleLaden, B. V. (1.docx
Write a summary of  the fallowing the articleLaden, B. V. (1.docx
 
Write a summary of the fallowing Attachmentsthe discussi.docx
Write a summary of the fallowing Attachmentsthe discussi.docxWrite a summary of the fallowing Attachmentsthe discussi.docx
Write a summary of the fallowing Attachmentsthe discussi.docx
 
Write a small discussion in only 2 pages of the following questions.docx
Write a small discussion in only 2 pages of the following questions.docxWrite a small discussion in only 2 pages of the following questions.docx
Write a small discussion in only 2 pages of the following questions.docx
 
Write a short paper on the followingRelative to all of the issu.docx
Write a short paper on the followingRelative to all of the issu.docxWrite a short paper on the followingRelative to all of the issu.docx
Write a short paper on the followingRelative to all of the issu.docx
 
Write a short (half page) paragraph for each question and be s.docx
Write a short (half page) paragraph for each question and be s.docxWrite a short (half page) paragraph for each question and be s.docx
Write a short (half page) paragraph for each question and be s.docx
 

Recently uploaded

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Recently uploaded (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

In Chapter 5, the interesting and controversial topic of cyber secur.docx

  • 1. In Chapter 5, the interesting and controversial topic of cyber security is presented. As stated in the course textbook by Turban, Volonino, & Wood (2015), battling cyber threats is one of the costs of doing business in today’s globally-connected corporate environment. Distributed Denial-of-Service attacks (DDoS), malware infections, and other black-hat hacker generated security breaches have increased in frequency and pose even greater threats to government agencies, military organizations, and corporate enterprises. The U.S. Office of Personnel Management, Sony, Target, JP Morgan and eBay are just some of the entities that experienced major data breaches in 2015. The greatest theft of medical records ever occurred in 2015 at the health insurers Anthem and Primera. As Bloomberg Technology reported, "U.S. companies and government agencies suffered a record 1,093 data breaches" in 2016, "a 40 percent increase from 2015, according to the Identity Theft Resource Center (Links to an external site.)Links to an external site. " (Kharif, 2017). In 2016, Wendy's fast food chain and the Democratic National Committee among others were victims of "headline-grabbing hacks" (Kharif, 2017). The 2017 "massive breach of one of the largest repositories of Americans' most sensitive financial data" occurred in the attack on "dozens of sensitive databases" at Equifax (Riley, Robertson, & Sharpe, 2017). Of the great concern and receiving much media attention, is that regarding the potential for power-grid cyber attacks, something that would clearly undermine the safety and security of the world’s nations. References Riley, M., Robertson, J., & Sharpe, A. (2017, September 29). The Equifax hack has the hallmarks of state-sponsored pros. Bloomberg Businessweek. Retrieved from
  • 2. https://www.bloomberg.com/news/features/2017-09-29/the- equifax-hack-has-all-the-hallmarks-of-state-sponsored- pros (Links to an external site.)Links to an external site. Sharif, O. (2017, January 19). 2016 was a record year for data breaches. Bloomberg Technology. Retrieved from https://www.bloomberg.com/news/articles/2017-01-19/data- breaches-hit-record-in-2016-as-dnc-wendy-s-co-hacked (Links to an external site.)Links to an external site. Turban, E., Volonino, L., & Wood, G. (2015). Information technology for management: Digital strategies for insight, action, and sustainable performance. (10th ed.). Hoboken, NJ: John Wiley & Sons Inc. Written Assignment: Conduct research on a recent threat or attack on a government agency, military organization, or corporate enterprise. Present data that describes the type of threat, the degree of harm caused by the threat, and describe who or what entity the perpetrator(s) might have been that could benefit from such an action. Give details on solutions that might have prevented the exploit and could be utilized to assist in mitigating or eliminating cyber threats in the future.