Verified Document

Report On A Cyber Security Firm Verizon Research Proposal

Related Topics:

Verizon Report

About Verizon

In 2000, Verizon Communications Inc. had been formed and led in offering communication and technology services. It has its headquarters in New York. Verizon specializes in data, voice, and video services. It offers network solutions by responding to customers' demands and providing secure connections and control features. Verizon is also a player in fixed wireless connection and mobile computing. Besides, it was the first company to launch mobility 5G. These operations aim to serve businesses and consumers, aiming to offer environmental, social, and economic advancement (Verizon, 2022).

Verizon's Value Proposition

Verizon is guided by three propositions: innovation, performance, and brand. The goal is to have these effects felt by consumers and businesses (Verizon, 2022).

Workforce Size

According to Forbes, data recorded in May 2021 shows that Verizon has 132,200 employees who hold different roles (Forbes, 2021). Verizon serves an extensive network of mobile network carriers. Among them include US Mobile, Ting, Net10, Red Pocket, Pix Wireless, and Straight Talk (Verizon, 2022)

Cyber Security at Verizon

According to Stanton (2017), users expect data privacy, which is instrumental in defining how they interact with various companies such as Verizon. Companies are expected to collect and transmit data securely and mitigate any data-breach risks. Laws require the government to access cell-site information, and according to Verizon and other key players, the Fourth Amendment should be applied in accessing such data. Laws that focus on content distinction and third-party doctrine have little contribution in the digital era, especially when responding to privacy needs. The author explains that a substantial amount of data is transmitted across networks, which cannot be avoided.

Consequently, there should be robust legal platforms that promote data privacy. As a company, Verizon is dedicated to ensuring data privacy. However, there are legal challenges that tend to compromise this commitment. For instance, Stanton explains that in 2018, there were about 40000 court orders requiring Verizon to service the law-enforcement agencies with cell-site data.

Messmer (2014) explains that in 2013, Verizon recorded 1367 cases of data breaches across 95 countries, and most of these attacks were through Web applications. Indeed, a Verizon report indicates that 35 percent of Verizon data breaches are linked to Web applications, with the main reason for the attack being financial gain. According to Jacobs, a Verizon analyst, Messmer explains that the attackers exploit weak codes on Joomla, WordPress, and Drupal, which shows the importance of Verizon enhancing its security features. Messmer also notes that Verizon emphasizes the need for companies to deploy security features in their CMS through automatic patching. Besides, collaboration with other security organizations like McAfee helps enhance security systems for Verizon network users. Messmer adds that Verizon notes that some attacks emanate from insiders who collaborate with cybercriminals or engage in risky cyber activities, especially real estate. For instance, some users exchange emails containing malicious attachments, which provides an ideal avenue for attackers. Thus, these threats can be intentional or unintentional. Verizon notes that data security requires organizations to have training programs in such instances. Thus, training is one of the cyber threat mitigation processes by Verizon. Verizon...

…website (Verizon, 2022), the company collects users' data that is useful in facilitating effective services. Besides, the company gets information from other agencies, such as demographic data, and this helps in enhancing the communication process. For instance, data from social media sites when users interact with Verizon through social media platforms. Information is shared when Verizon wishes to inform customers about new products. In some instances, Verizon can share private information with other parties. For example, when compelled by the law to share such information, acting in the public interest, credit companies, for regulation and auditing, and in cases where users' consent is obtained.

Conclusion

Verizon serves a wide network, making it a frequent target of cyber-attacks. It is dedicated to serving individual consumers and businesses. Verizon educates businesses and consumes the ways to protect themselves from constant cyber threats. The two groups are their primary audience of the cyber security sensitization programs. Verizon has invested in robust network tools to respond to the challenges as the network infrastructure provider. Besides, it has a professional team equipped with contemporary knowledge of cyber threats. Verizon indicates that cyber security is not won through robust infrastructure but requires individual stakeholders to take responsibility for how they interact with the network, share information, and store it. For instance, users with antivirus programs who fail to practice safe behavior like running multifactor authentication are at risk of phishing attacks. The same happens among mobile users who download applications and follow links without verifying their authenticity. Thus, Verizon has deployed modern tools to counter cyber…

Sources used in this document:

References


Allodi, L., & Massacci, F. (2017). Security events and vulnerability data for cybersecurity risk estimation. Risk Analysis, 37(8), 1606–1627. https://doi.org/10.1111/risa.12864


Forbes. (2021). Verizon Communications (VZ). Forbes. Retrieved April 1, 2022, from https://www.forbes.com/companies/verizon-communications/?sh=717aa5f94314


Messmer, E. (2014). Verizon: Web apps are the security punching bag of the Internet. Network World.


Verizon. (2022, March 10). Verizon Fact Sheet. Verizon Fact Sheet | About Verizon. Retrieved April 1, 2022, from https://www.verizon.com/about/our-company/verizon-fact-sheet

Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Security Most Important Cyber
Words: 2328 Length: 8 Document Type: Research Paper

The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012). In addition to that, the operating system of Apple is now considered as one of the most favored

Cyber Security Cloud Computing
Words: 1389 Length: 4 Document Type: Term Paper

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

Cybersecurity As an Organizational Strategy an Ethical and Legal...
Words: 3101 Length: 10 Document Type: Research Paper

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Cybersecurity Vulnerability Issues
Words: 2738 Length: 10 Document Type: Research Paper

Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware

Cybersecurity Recent Case Studies of
Words: 4325 Length: 16 Document Type: Term Paper

The level and sophistication of this attack on the Department of Defense's systems suggests that professionals conducted this attack with significant resources at their disposal and an interest in the national security secrets of the United States. The data mining operation was so successful that, while detected, still managed to make-off with a significant amount of information. Since the attack, the United States responded in a number of critical ways.

Cyber Security Ethical Issues Associated With Ransomware
Words: 893 Length: 3 Document Type: Case Study

Cyber Security Ethical issues associated with ransomware It is only natural that people who are known to you will send you messages through your email address. It is lost on me how those engaging in ransomware business access information about their potential victims like the email address as to send you messages that have been infected that when opened infect the whole computer. These people engage in irregular activities. For the residents

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now