StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Explanation of Security Breach and Request for Formal Apology - Essay Example

Comments (0) Cite this document
Summary
The paper "Explanation of Security Breach and Request for Formal Apology" is aimed to apology about the security breach. The author of this paper investigated the issue and established that lab lock has malfunctioned and will make arrangements for a technician to repair the lock’s firmware…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Explanation of Security Breach and Request for Formal Apology
Read TextPreview

Extract of sample "Explanation of Security Breach and Request for Formal Apology"

Explanation of Security Breach and Request for Formal Apology to Linda Luu Hello Roger, The security breach occurred while I was attendinga meeting to plan next month’s launch of the Bionic Leg event. As soon as I was informed of the breach, I investigated the issue and established that our lab lock has malfunctioned. In this regard, I will make arrangements for a technician to repair the lock’s firmware.
A month ago, the lock manufacturer sent me an email to warn me of the possibility that the lock could malfunction and to schedule for a technician to come and fix the lock’s firmware. No further queries were made on this issue following the current measures on cost-cutting, and the fact that the Head of Security was dismissed six weeks ago. I apologize for not informing you of the problem with the system on time. I am heavily involved in planning for the launch of the Bionic Leg event, a project that is critical to the company’s ongoing success, and that is why I have not had time to resolve the issue.
Linda is an important employee to our company because she is the most knowledgeable person in Canada in the field of bionics. Bob Loblaw is the only other person in the company who possesses similar expertise. Since they work together, there is a chance that if Linda were to leave then Bob would also leave. This would be a great loss for the company. Without the service of these two key employees, the Bionics Division would be forced to close. In the last three years, the company has been surviving on the revenues generated from the Bionics Division. Furthermore, we risk losing Linda to our main competitor, Bionic Works Co., which has been trying to poach her from us for quite some time. Her decision to stay is based on her loyalty to my leadership and because she enjoys working with our team.
To prevent Linda from leaving the company, we need to compromise company policy and fulfill her terms. I would like to ask you to apologize respectfully to Linda following the conversation you had with her recently. To avoid future misunderstandings, please avoid contacting Linda directly, either by phone or email; instead contact me and I will relay any messages you have for her. Also, I would appreciate if you treat all members of the lab team with full respect and dignity by using a polite tone. I am doing all this to restore the company’s profitability.
I would like to meet with you in person to discuss the steps we need to take to tighten security and avoid similar issues from occurring in the future.
Sincerely,
Kayla Campbell
Western Regional Director of Operations
Labs Inc. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Explanation of Security Breach and Request for Formal Apology Essay”, n.d.)
Explanation of Security Breach and Request for Formal Apology Essay. Retrieved from https://studentshare.org/business/1701835-explanation-of-security-breach-and-request-for-formal-apology
(Explanation of Security Breach and Request for Formal Apology Essay)
Explanation of Security Breach and Request for Formal Apology Essay. https://studentshare.org/business/1701835-explanation-of-security-breach-and-request-for-formal-apology.
“Explanation of Security Breach and Request for Formal Apology Essay”, n.d. https://studentshare.org/business/1701835-explanation-of-security-breach-and-request-for-formal-apology.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Explanation of Security Breach and Request for Formal Apology

IPad's Security Breach

...? Full Paper Hacking a Website Group of expert hackers breached Eidos Montreal website compromising 25,000 email addresses along with 350 resumes dated May 13 2011. The description of the incident was stated by the company as "Square Enix can confirm a group of hackers gained access to parts of our Eidosmontreal.com website as well as two of our product sites. We immediately took the sites offline to assess how this had happened and what had been accessed, then took further measures to increase the security of these and all of our websites, before allowing the sites to go live again"(Square enix confirms data lifted in website raids • the register ). Nonetheless, data associated with online e-commerce transactions and credit cards...
6 Pages(1500 words)Assignment

IPad's Security Breach

...? Full Paper Organized Hack A website of an organization d as ‘Square Enix’ was expansively penetrated by a group of experthackers on May 13 2011. The fundamental objective of ‘Square Enix’ is to hire skillful software developers, testers and creative thinkers to work on different projects related to game development. Likewise, the breach conceded 25,000 email addresses and 350 resumes. Later, the explanation regarding the hack was publicized in these following sentences by the victim as "Square Enix can confirm a group of hackers gained access to parts of our Eidosmontreal.com website as well as two of our product sites. We immediately took the sites offline to assess how this had happened and what had been accessed, then took further...
5 Pages(1250 words)Assignment

Assignment 4: ipad security breach

Despite these benefits, users of such gadgets face security threats touching on the confidentiality of their accounts as a result of malicious hacking into IT systems. Hacking into a Web site, a real-world case involving a known company It is never justifiable to hack into a Web site belonging to an individual or a company. This is because such an action leads to unauthorized access of information of a company or its customers. The cumulative effect of this is fear and embarrassment to businesses. Fear results from the potentialities that such hackers could pose as the company and conduct an illegal parallel business or post compromised notices to its website or customers. Hacking into the website of a company also brings fear am...
5 Pages(1250 words)Essay

IPad's Security Breach

...?iPad's Security Breach Introduction A security hole in Apple’s iPad, stormed the technology industry about the threats which can affect an individual or an entire nation. AT&T, the service provider for Apple iPad accounted for a security breach as the email-ids’ of more than 1,00,000 users got exposed by a group of hackers called Goatse Security. The group claims to work for the betterment of the society with the aim to expose the security vulnerabilities of different gadgets (NPR, 2011). This issue has a great impact on the technological industry as leakage of information and personal data is an unethical practice under law which can create serious threat if not dealt seriously by the security authority. This report is concerned...
5 Pages(1250 words)Coursework

IPad's Security Breach

...? Running Head: iPad’s SECURITY BREACH AT&T‘s iPad’s Security Breach of Introduction In June 2004, Apple suffered an embarrassment when a security breach exposed personal details of its iPad’s owners, among them influential politicians, businessmen, corporate CEOs, and the U.S military (Tate, 2011). This hacking was the work of a website security group called Goatse Security, which shared the iPad’s users IDs and personal information with a media firm called Gawker Media, LLC (Tate, 2011). However, the website security firm informed AT&T of the security breach, which was immediately rectified. Subsequent to this breach of AT&T’s security, a lot of security issues have since arisen for the firm and other computer security firms. In addition...
4 Pages(1000 words)Essay

The Security Breach at Nelm

... The Security Breach at Nelm The security breach at Nelm has resulted in data being acquired by un ized users tapping into the system and gaining access to sensitive files. There is a concern that an insider is gaining the information on the advertising campaign and making it available to the Erm Company. There is also the possibility that an outsider has taken advantage of the system configuration and its security flaws to gain unauthorized access to the data. Nelm has taken the first step by appointing a head security officer that should report directly to the board of directors. However, there are serious flaws in the system configuration and the access control. The first concern should be that an insider might be acquiring...
2 Pages(500 words)Case Study

IPad's Security Breach

Hacking into an organization can never be justified on any ground. Certain security research firms claim that hacking allows them to find fault in the security systems and point them out to the organization. But even under such cases organizations suffer major setbacks due to hacking attempts. Even if hacking is to be attempted, it must remain confidential and public fear should not be escalated on such occasions. An example of a hacking victim is Lockheed Martin. Lockheed Martin is a global security and technology company. Lockheed Martin is ‘Pentagons No. 1 arms supplier and the U.S. governments top information technology provider’ (Reuter, 2011). Hacking into the system of Lockheed Martin translates as threatening t...
5 Pages(1250 words)Research Paper

Sony PlayStation Network security breach

... and efforts. Sony also emphasized on the lawmakers to enact the more strict guidelines for the protection of personal information (Carlson, 2011). Officials other than the U.S lawmakers are also concerned with the issue of data breaching. States regulators in U.S and privacy officials in foreign countries have also concerns about the Sony’s network security and demanded the explanation from the Company management. Attorney General George Jepsen refrained and said that Network’s users were not intimated promptly (Carlson, 2011). References: Brice, E.C. (2011). The Sony PlayStation Network Breach – Yet Another Lesson in Crisis Communication, Available from http://blog.lumension.com/3725/the-sony-playstation-network-breach-%E2%80%93-yet...
4 Pages(1000 words)Essay

Sony Playstation Security Breach

Only a single vulnerability is needed for hackers to exploit and put an entire database at risk. In order to avoid such vulnerabilities, database developers and application developers must dance to the same tune.
Sony’s data center in San Diego, CA was hacked into on April 19, 2011. The hackers had gained access of customers’ data through Sony’s PlayStation Network servers. This attack on Sony is said to be the largest personal data heist in history with reports estimating that around 77 million Qriocity and PSN users’ accounts and 24.5 million Sony Online Entertainment user accounts were affected. (Better Business Bureau, 2011).
Strange activities had been detected by Sony Corporation on their network system. They noticed...
8 Pages(2000 words)Essay

IPads Security Breach

...1 Hacking a Website Group of expert hackers breached Eidos Montreal website compromising 25,000 email addresses along with 350 resumes dated May 13 2011. The description of the incident was stated by the company as "Square Enix can confirm a group of hackers gained access to parts of our Eidosmontreal.com website as well as two of our product sites. We immediately took the sites offline to assess how this had happened and what had been accessed, then took further measures to increase the security of these and all of our websites, before allowing the sites to go live again"(Square enix confirms data lifted in website raids • the register ). Nonetheless, data associated with online e-commerce transactions and credit cards was available...
7 Pages(1750 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Explanation of Security Breach and Request for Formal Apology for FREE!

Contact Us