Cyber Security/Cloud Computing
Consider a recent cyber security breach (specific event) and address the following questions:
Describe the circumstances involved
Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud
Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported that the attacks were carried out using two servers at a Web-hosting company located in Ukraine and a group of personal computers. The report further says that the attackers controlled the previously mentioned devices after infecting them with malicious software program. The stolen information from the company included names, addresses, e-mail addresses, and phone numbers. Information regarding to bank account number remained undisclosed to the hackers. The other side of the story is as reported by Symantec. The media claim that the hackers sent out scam e-mails seeking private financial information such as bank account numbers. In addition, they asked the users to click on a link that automatically infected their personal computers with the malicious software. After the information was stolen, the hackers re-emailed the victims claiming that they are going to delete their files unless the victims met some payment requirements as demanded by them (Brenner, 2009).
Identify the ethical aspects associated with the breach
The hackers successfully managed to infiltrate the confidentiality of the victims of the scam. The security of the victims data was then jeopardized as the hackers demanded payment or otherwise the delete all the data from the victims' database. This is risky as the victims could end up losing crucial data.
Identify the legal aspects associated with the breach
The cyber security breach was launched in Ukraine targeting the U.S. citizens. Since the victims are hackers and U.S. citizens probably Ukrainians, it becomes difficult for the victims to report the case to either Ukraine authorities or U.S.. This is because by reporting the case to U.S. authorities, the courts may not have legal jurisdiction to charge the hackers even if they are court. On the other hand, it becomes difficult and expensive to...
Cloud Computing at EasyJet 25/08/2015 Brief Company background Discussion of business problem High level solution Benefits of solving the problem Business/technical approach Business process changes Technology or business practices used to augment the solution Conclusions and overall recommendations High-level implementation plan EasyJet, a Luton-based low cost airline in the UK has managed to create differentiation from other low cost airlines through the introduction of a new system of seat booking. The move brought in a new era in the otherwise
adopting the use of cloud-based technologies in the last five years. This trend has caused a significant shift in the way that many organizations interact with information both internally and externally. Yet there are also many risk factors inherent in these technologies, some of which are the result of insider conspiracy (Brender & Markov, 2013). Cloud computing offers many advantages over traditional IT infrastructure which make it an attractive option,
organizations can do to protect client data comprehensively and how they do this. It will also examine the most common forms of data customers generate, and take a look at some of the contemporary hardware and software that organizations protecting and handling data in the cloud use presently. Common Types of Customer Data Data Identity: The individual is at the core of any database, so gaining an insight into how a person
Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met
Fundamental Challenges With respect to cybersecurity, there are two fundamental challenges – technological and human. On the technology side, many firms underinvest in cybersecurity, for whatever reason. It can be difficult to keep up with evolving threats, such as new ransomware, and companies that lack modern cybersecurity technology are especially vulnerable. In particular, companies are often keen to adopt new technologies – today cloud computing and the use of personal mobile
Cloud SecurityIntroductionCloud security refers to the integrated technologies and procedures to respond to potential internal and external business threats. Its primary goal is to protect cloud computing infrastructure. It forms an essential element in the spheres of cybersecurity, particularly in the ever-growing digital business world. Enterprises have embraced digital migration in most of their services, so cloud security has become indispensable. Threats to data security are more advanced owing to
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now