Conduct research on a recent threat on a government agency

Assignment Help Management Information Sys
Reference no: EM131817412

In Chapter 5, the interesting and controversial topic of cyber security is presented. As stated in the course textbook by Turban, Volonino, & Wood (2015), battling cyber threats is one of the costs of doing business in today's globally-connected corporate environment.

Distributed Denial-of-Service attacks (DDoS), malware infections, and other black-hat hacker generated security breaches have increased in frequency and pose even greater threats to government agencies, military organizations, and corporate enterprises.

The U.S. Office of Personnel Management, Sony, Target, JP Morgan and eBay are just some of the entities that experienced major data breaches in 2015. The greatest theft of medical records ever occurred in 2015 at the health insurers Anthem and Primera.

As Bloomberg Technology reported, "U.S. companies and government agencies suffered a record 1,093 data breaches" in 2016, "a 40 percent increase from 2015, according to the Identity Theft Resource Center (Links to an external site.)Links to an external site." (Kharif, 2017). In 2016, Wendy's fast food chain and the Democratic National Committee among others were victims of "headline-grabbing hacks" (Kharif, 2017).

The 2017 "massive breach of one of the largest repositories of Americans' most sensitive financial data" occurred in the attack on "dozens of sensitive databases" at Equifax (Riley, Robertson, & Sharpe, 2017). Of the great concern and receiving much media attention, is that regarding the potential for power-grid cyber attacks, something that would clearly undermine the safety and security of the world's nations.

References

Riley, M., Robertson, J., & Sharpe, A. (2017, September 29). The Equifax hack has the hallmarks of state-sponsored pros. Bloomberg Businessweek.

Sharif, O. (2017, January 19). 2016 was a record year for data breaches. Bloomberg Technology.

Turban, E., Volonino, L., & Wood, G. (2015). Information technology for management: Digital strategies for insight, action, and sustainable performance.(10th ed.). Hoboken, NJ: John Wiley & Sons Inc.

Written Assignment:

Conduct research on a recent threat or attack on a government agency, military organization, or corporate enterprise.

Present data that describes the type of threat, the degree of harm caused by the threat, and describe who or what entity the perpetrator(s) might have been that could benefit from such an action.

Give details on solutions that might have prevented the exploit and could be utilized to assist in mitigating or eliminating cyber threats in the future.

Reference no: EM131817412

Questions Cloud

What tax issues should adam and rodney consider : What tax issues should Adam and Rodney consider with respect to the distribution
Determine the maximum income from operations : Battonkill Company, operating at full capacity, sold 176,600 units at a price of $81 per unit during 2010. Determine the maximum income from operations possible
Develop policy and procedures to ensure team cohesion : The scenario is that my company has moved fro 8 employees to 20. I need to develop policy and procedures to ensure team cohesion.
Financial risks to providers of fee-for-service-capitation : What is the major difference between the financial risks to providers of fee-for-service and capitation?
Conduct research on a recent threat on a government agency : Conduct research on a recent threat or attack on a government agency, military organization, or corporate enterprise.
Disadvantages of property tax in accordance : List the advantages and disadvantages of property tax in accordance of tax evaluation criteria (efficiency, equity, adequacy, and transparency).
Personal computer as a means to regain control : How would you apply a personal computer as a means to regain control over the business
What is the payback period for this project : Which of the followings is NPV of this two-year project? What is the Payback Period for this project?
Marketing opportunity and give possible reason : Analyze singapore and china country which mutual funds may have marketing opportunity and give possible reason?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Risk, return and portfolios in general

Risk, return, and portfolios in general. Technology stocks in particular - How would you respond to such a comment?

  Prepare a open source software research project

In MS PowerPoint, create a presentation with slides that describe the open source software and how it works. Discuss the role this open source software has in management information systems.Remember, management information systems is the manageme..

  Reserch about influence of information technology education

Reserch about The Influence of Information Technology Education on Students' Entrepreneurial Orientation.

  Summarize everything you know about securing a system

Summarize everything you know about securing a system in an easy to follow checklist.Provide a short and quick one sentence description on each setting or task.

  Evaluate the financial risks associated

Evaluate the financial risks associated with operating internationally.Evaluate what the financial risks could be if they were to expand internationally.

  Discuss about the risk of wifi calling on mobile device

User prefers Wi-Fi calling rather than cellular calling as it is free of cost. As this feature is available on the majority of social media it is in trend.

  Collocation of team members - unimportantmark is a member

collocation of team members - unimportant?mark is a member of the executive team that is sponsoring a new project. he

  Perspective of current hot topics in information security

To build an understanding and perspective of current hot topics in Information Security; and To build generic skills including, but not limited to: a capacity for teamwork and collaboration; an ability for critical thinking, analysis and problem solv..

  Create a data warehouse project plan

Imagine that the CIO has been impressed with your past performance and has promoted you to database administrator. Your first project is to create a data warehouse project plan that will merge five (5) disparate operational data sources into a com..

  What kind of short-term and long-term effects might

Suppose that rather than time, the pressure is to do more with less, that is to accomplish the same scope with staff cuts and budget cuts. Does that change your answer? That is, what steps should a PM take if he feels this will jeopardize projec..

  Determining vulnerabilities for a database server

Case Project: Determining Vulnerabilities for a Database Server, You have interviewed Ms. Erin Roye, an IT staff member, after conducting your initial security resting of the Alexander Rocco Corporation. She informs you that the company is running..

  Identify missing security elements in their current security

What are some of the organization's policies and the infrastructure used to protect intellectual assets? And, does it meet industry standards and practices?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd