Reference no: EM131179523
Case Study 1: Cyber Security in Business Organizations
Protecting organizational assets and information within the company has become a top priority for many organizational leaders.
Review the article titled "Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It", located here-"https://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of-credit-card-data#p1".
Write a four to six (4-6) page paper in which you:
Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information.
Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to why Target overlooked or ignored the red flag(s).
Determine the main actions that Target took after the breach occurred and evaluate the efficiency of such actions.
Conclude the main reasons why the attack on Target occurred. Give your opinion as to whether or not the attack was mainly due to the poor infrastructure or the inability of management to act accordingly. Justify your response.
Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Outline the strategic implications of information assurance and security in an information technology environment.
Explain how information technology systems influence organizational strategies.
Outline the challenges and strategies of e-Business and e-Commerce technology.
Evaluate the ethical concerns that information technologies raise in a global context.
Use technology and information resources to research issues in information systems and technology.
Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.
Identify at least two social determinants of health
: Define the indicators of the issue (i.e., incidence, mortality, morbidity, and hospitalizations) and explain how these influence the population and public health issue you selected.
|
How might boards and senior executives be affected
: What possible effects might rating agencies, regulators, and government officials have on risk management in the next 10 years? How might boards and senior executives be affected by these changes in risk management?
|
Calculate the angle cde and the lengths cd and de
: It was not possible to occupy D, but it could be observed from C and E. Calculate the angle CDE and the lengths CD and DE, taking DE as the datum, and assuming all the observations to be correct
|
Manage personal work priorities and professional development
: BSBWOR501 Manage personal work priorities and professional development - Describe a situation where you may have several competing demands for your time in your work role.
|
Determine the fundamental challenges
: Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information. Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to ..
|
What does equity and diversity mean to you
: Discussing: Equity & critical diversity- What does "equity and diversity" mean to you? As a teacher/curriculum worker, where do you stand on these issues and/or ideas
|
Find ways that business organization use mobile technologies
: Give your opinion on whether or not mobile and wireless devices have contributed to the rise in social media activity. Next, determine at least two (2) ways that business organizations use mobile technologies to become more efficient, productive, ..
|
Calculate the true bearing of the line at b
: Calculate the true bearing of the line at B, and the longitude of that point. Calculate also the bearing and distance from B of a point on the meridian of B at the same latitude as the starting point A. The radius of the Earth may be taken as 6273..
|
Calculate the lengths of track to be lifted
: Determine the amended radius assuming that the shift can be calculated with sufficient accuracy on the old radius. Calculate the lengths of track to be lifted and of new track to be laid.
|