Verified Document

Human Aspects In Cybersecurity On A Government Agency And A Private Organization Research Paper

Human Aspects in Cybersecurity on a Private Organization and a Government Agency In the contemporary digital environment where online communication and internet have become a necessity, the advancements in sophisticated modern technology have assisted both private and public organization to take the advantages of communication networking by expanding their network systems to facilitate information exchanges. Globally, more than 2 billion internet and 5 billion mobile phone users make connection daily. Moreover, people exchange over 294 billions emails, and over 5 billion messages daily. The convenience, and growing popularity of digital networks have made businesses to rely on internet networking to carry out daily tasks. Despite the benefits of internet technology both government agencies and private enterprises face increases risks by cyber attacks from different part of the world. Daily, cyber criminals continue to develop advanced and sophisticated hacking tools to steal data and other sensitive information from organizations. Typically, hackers use different tactics such as computer hacking, financial scams, email stalking and virus attacks to commit crimes. The first major cyber attacks happened in 2000 where 45 million computers globally were affected by virus. In 2010, the rates of global spam suddenly increased from 1.4% to 89.1%. In the last few years, a cyber crime global landscape has changed rapidly, criminals are using sophisticated technology as well as greater knowledge of advanced cyber security to penetrate the network systems of private and network systems of different organizations. The cyber espionage, cyber crimes and other cyber malicious activities have made several organizations to secure to a great financial loss of up to several billion of dollars. By 2010, the politically motivated cyber espionages have penetrated the business community leading to economic loss of hundred of billion dollars across different industries ranging from private business to non-governmental organizations.

The objective of this paper is to investigate the impact of cyber crime using the human factors perspectives on a small government agencies, a business...

The Target Corp (a private organization), government agency (Department of Defense) and a non-government organization (Community Health Systems)
The Target Corp

The Target Corporation is the second largest retail store in the United States apart from the Walmart, and has stores in more than 1,801 across the United States. The company retail format include discount store, hypermarket, TargetExpress, and CityTarget. The company mission statement is as flows:

"Our mission is to make Target the preferred shopping destination for our guests by delivering outstanding value, continuous innovation and an exceptional guest experience by consistently fulfilling our Expect More. Pay Less. brand promise"

"To support our mission, we are guided by our commitments to great value, the community, diversity and the environment." (Target, 2014 p 1).

Method Target Corp has been targeted

In 2014, the Target Corp announced that it had been a victim of cyber attack where hackers had stolen more than 70 million contact information, and over 40 million debit and credit cards of the Target customers. The Target announced that the stolen information include email, mailing addresses, and phone numbers of over 70 millions shoppers. Typically, the attack caused enormous damages to Target financial reputation making the stock prices to decline, which led to a resignation of the company Senior IT officer. The Target was attacked because the company refused to integrated security tools in their infrastructure despite a series of security warning from the federal government. Typically, Target Corp was vulnerable to attack because the company did not use the sophisticated security system to protect their payment system. Although, the government sent memo to the company executives that that the attackers were targeting the payment system, and despite this warning, the company ignored the warning.…

Sources used in this document:
Reference

CSIS (2014). The Economic Impact of Cybercrime and Cyber Espionage. The Center for Strategic and International Studies.

Olavsrud, T. (2014). 11 Steps Attackers Took to Crack Target. CXO Media Inc. a subsidiary of IDG Enterprise.

Riley, C & Pagliery, J. (2015). Target will pay hack victims $10 million. CNN Tech.

Smith, C. (2014). It turns out Target could have easily prevented its massive security breach. Media, LLC.
Cite this Document:
Copy Bibliography Citation

Related Documents

Human Aspects in Cyber and IT Security
Words: 2582 Length: 7 Document Type: Research Paper

Human Aspects in IT and Cybersecurity Outline Government Justification of Informing Private industry to improve or Set up Cyber-security Methods of the Government Interventions Impacts of Government Regulation on National Security Failure to comply to related cyber regulations Meeting the minimum requirements. Exceeding the Minimum Requirements The economic and national security of the United States rely on the effective functioning of the country critical infrastructures. Recently, the U.S. government has issued an executive order to manage the

Cybersecurity As an Organizational Strategy an Ethical and Legal...
Words: 3101 Length: 10 Document Type: Research Paper

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Cyber Security Ethical Issues Associated With Ransomware
Words: 893 Length: 3 Document Type: Case Study

Cyber Security Ethical issues associated with ransomware It is only natural that people who are known to you will send you messages through your email address. It is lost on me how those engaging in ransomware business access information about their potential victims like the email address as to send you messages that have been infected that when opened infect the whole computer. These people engage in irregular activities. For the residents

U.S. Government the United States
Words: 3390 Length: 10 Document Type: Term Paper

This as an important moment in the history of the Cold War because it marked the start of a new series of talks between the Palestinians and the Israeli side. This moment also proved the importance of the State Secretary in relation to the issues of foreign policy and the international community. At this moment, some of the most important cabinets in the executive concern issues such as internal affairs

Access Single Most Important Cybersecurity Vulnerability Facing It...
Words: 2445 Length: 8 Document Type: Research Paper

Cyber Security Vulnerabilities Single Most Important Cybersecurity Vulnerability Facing IT Managers Today Cyber Security Vulnerabilities Facing IT Managers Today At present, computers link people to their finances through online banking and a number of many online applications that offer access to accounts. In addition, they provide a connection to a broad variety of information, including social media, for instance, Face book, YouTube and Twitter. Interconnectivity of the systems have made it possible for

Laws on Cyber Crimes
Words: 2997 Length: 10 Document Type: Term Paper

Cyber Security Currently, the internet has become a significant infrastructure, which has brought new degrees of productivity, convenience, and effectiveness for the private and public firms. The many incidents of internet attacks reflect the vulnerability of the information systems, the severity of malicious programs and the offensive nature of technology. Similarly, either attackers can hide their identity, through disabling logging facilities or altering event logs, which makes them go undetected. On

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now