SlideShare a Scribd company logo
1 of 1
Read
Chapter 11 –
According to the authors, privacy and security go hand in hand;
and hence, privacy cannot be protected without implementing
proper security controls and technologies. Today, organizations
must make not only reasonable efforts to offer protection of
privacy of data, but also must go much further as privacy
breaches are damaging to its customers, reputation, and
potentially could put the company out of business. As we
continue learning from our various professional areas of
practice, its no doubt that breaches have become an increasing
concern to many businesses and their future operations. Taking
Cyberattacks proliferation of 2011 into context, security experts
at Intel/McAfee discovered huge series of cyberattacks on the
networks of 72 organizations globally, including the United
Nations, governments and corporations.
Q2: From this research revelation in our chapter 11, briefly
state and name the countries and organizations identified as the
targeted victims?
Use APA Format

More Related Content

Similar to Read Chapter 11 – According to the authors, privacy and securi.docx

Course Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxCourse Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
marilucorr
 
Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11
kedsliemichal
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report
Angela Gunn
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016
Tim Grieveson
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
at MicroFocus Italy ❖✔
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 

Similar to Read Chapter 11 – According to the authors, privacy and securi.docx (20)

Chapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxChapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docx
 
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxCourse Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
 
Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report2016 HPESR Cyber Risk Report
2016 HPESR Cyber Risk Report
 
HPE Security Report 2016
HPE Security Report 2016HPE Security Report 2016
HPE Security Report 2016
 
HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016HPE Cyber Risk Report 2016
HPE Cyber Risk Report 2016
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
Security economics
Security economicsSecurity economics
Security economics
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 

More from danas19

Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
danas19
 
Recognizing Fallacies Constructing sound arguments requires .docx
Recognizing Fallacies Constructing sound arguments requires .docxRecognizing Fallacies Constructing sound arguments requires .docx
Recognizing Fallacies Constructing sound arguments requires .docx
danas19
 
Recognizing Written ArgumentFor this weeks discussion, Id like.docx
Recognizing Written ArgumentFor this weeks discussion, Id like.docxRecognizing Written ArgumentFor this weeks discussion, Id like.docx
Recognizing Written ArgumentFor this weeks discussion, Id like.docx
danas19
 
Recognizing ArgumentsIn this assignment, you will apply key co.docx
Recognizing ArgumentsIn this assignment, you will apply key co.docxRecognizing ArgumentsIn this assignment, you will apply key co.docx
Recognizing ArgumentsIn this assignment, you will apply key co.docx
danas19
 
Recognition, Reification, and Practices of ForgettingEthica.docx
Recognition, Reification, and Practices of ForgettingEthica.docxRecognition, Reification, and Practices of ForgettingEthica.docx
Recognition, Reification, and Practices of ForgettingEthica.docx
danas19
 
Recipe Format for Café Laura (and HM courses)Header Information.docx
Recipe Format for Café Laura (and HM courses)Header Information.docxRecipe Format for Café Laura (and HM courses)Header Information.docx
Recipe Format for Café Laura (and HM courses)Header Information.docx
danas19
 
Recently, Kathy Smith, a project manager for a large industrial cons.docx
Recently, Kathy Smith, a project manager for a large industrial cons.docxRecently, Kathy Smith, a project manager for a large industrial cons.docx
Recently, Kathy Smith, a project manager for a large industrial cons.docx
danas19
 
Receiving funding from a grant or other source of funds is a great a.docx
Receiving funding from a grant or other source of funds is a great a.docxReceiving funding from a grant or other source of funds is a great a.docx
Receiving funding from a grant or other source of funds is a great a.docx
danas19
 
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docxReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
danas19
 
Received 9 December 2017 Revised 19 September 2018 Accepted.docx
Received 9 December 2017 Revised 19 September 2018 Accepted.docxReceived 9 December 2017 Revised 19 September 2018 Accepted.docx
Received 9 December 2017 Revised 19 September 2018 Accepted.docx
danas19
 
Recall that the goal of the Kyoto Protocol was to cut developed co.docx
Recall that the goal of the Kyoto Protocol was to cut developed co.docxRecall that the goal of the Kyoto Protocol was to cut developed co.docx
Recall that the goal of the Kyoto Protocol was to cut developed co.docx
danas19
 

More from danas19 (20)

Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
Recognizing Fallacies Constructing sound arguments requires .docx
Recognizing Fallacies Constructing sound arguments requires .docxRecognizing Fallacies Constructing sound arguments requires .docx
Recognizing Fallacies Constructing sound arguments requires .docx
 
Recognizing Written ArgumentFor this weeks discussion, Id like.docx
Recognizing Written ArgumentFor this weeks discussion, Id like.docxRecognizing Written ArgumentFor this weeks discussion, Id like.docx
Recognizing Written ArgumentFor this weeks discussion, Id like.docx
 
Recognizing the fact usernames passwords are the weakest link in.docx
Recognizing the fact usernames passwords are the weakest link in.docxRecognizing the fact usernames passwords are the weakest link in.docx
Recognizing the fact usernames passwords are the weakest link in.docx
 
Recognizing ArgumentsIn this assignment, you will apply key co.docx
Recognizing ArgumentsIn this assignment, you will apply key co.docxRecognizing ArgumentsIn this assignment, you will apply key co.docx
Recognizing ArgumentsIn this assignment, you will apply key co.docx
 
Recognition, Reification, and Practices of ForgettingEthica.docx
Recognition, Reification, and Practices of ForgettingEthica.docxRecognition, Reification, and Practices of ForgettingEthica.docx
Recognition, Reification, and Practices of ForgettingEthica.docx
 
Recipe Format for Café Laura (and HM courses)Header Information.docx
Recipe Format for Café Laura (and HM courses)Header Information.docxRecipe Format for Café Laura (and HM courses)Header Information.docx
Recipe Format for Café Laura (and HM courses)Header Information.docx
 
Recently, several flyers were found near the campus of the Universit.docx
Recently, several flyers were found near the campus of the Universit.docxRecently, several flyers were found near the campus of the Universit.docx
Recently, several flyers were found near the campus of the Universit.docx
 
Recently, Kathy Smith, a project manager for a large industrial cons.docx
Recently, Kathy Smith, a project manager for a large industrial cons.docxRecently, Kathy Smith, a project manager for a large industrial cons.docx
Recently, Kathy Smith, a project manager for a large industrial cons.docx
 
Recently your facility has had patient complaints about staff posing.docx
Recently your facility has had patient complaints about staff posing.docxRecently your facility has had patient complaints about staff posing.docx
Recently your facility has had patient complaints about staff posing.docx
 
Recently, I built a floating bed frame for my room. I watched a qu.docx
Recently, I built a floating bed frame for my room. I watched a qu.docxRecently, I built a floating bed frame for my room. I watched a qu.docx
Recently, I built a floating bed frame for my room. I watched a qu.docx
 
Recently, a US Circuit Court upheld the enforceability of Website .docx
Recently, a US Circuit Court upheld the enforceability of Website .docxRecently, a US Circuit Court upheld the enforceability of Website .docx
Recently, a US Circuit Court upheld the enforceability of Website .docx
 
Recently police departments across the nation has been accused o.docx
Recently police departments across the nation has been accused o.docxRecently police departments across the nation has been accused o.docx
Recently police departments across the nation has been accused o.docx
 
Recently Capital One experienced scandal1.  Understand what.docx
Recently Capital One experienced scandal1.  Understand what.docxRecently Capital One experienced scandal1.  Understand what.docx
Recently Capital One experienced scandal1.  Understand what.docx
 
Recall a time when you received bad news, either in your academic or.docx
Recall a time when you received bad news, either in your academic or.docxRecall a time when you received bad news, either in your academic or.docx
Recall a time when you received bad news, either in your academic or.docx
 
Recent genetics research on leadership by Dr. Richard Avey suggests .docx
Recent genetics research on leadership by Dr. Richard Avey suggests .docxRecent genetics research on leadership by Dr. Richard Avey suggests .docx
Recent genetics research on leadership by Dr. Richard Avey suggests .docx
 
Receiving funding from a grant or other source of funds is a great a.docx
Receiving funding from a grant or other source of funds is a great a.docxReceiving funding from a grant or other source of funds is a great a.docx
Receiving funding from a grant or other source of funds is a great a.docx
 
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docxReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
 
Received 9 December 2017 Revised 19 September 2018 Accepted.docx
Received 9 December 2017 Revised 19 September 2018 Accepted.docxReceived 9 December 2017 Revised 19 September 2018 Accepted.docx
Received 9 December 2017 Revised 19 September 2018 Accepted.docx
 
Recall that the goal of the Kyoto Protocol was to cut developed co.docx
Recall that the goal of the Kyoto Protocol was to cut developed co.docxRecall that the goal of the Kyoto Protocol was to cut developed co.docx
Recall that the goal of the Kyoto Protocol was to cut developed co.docx
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 

Read Chapter 11 – According to the authors, privacy and securi.docx

  • 1. Read Chapter 11 – According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations. Q2: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims? Use APA Format