Nobody downloaded yet

Assignment 2: Hacking the AIS - Essay Example

Comments (0) Cite this document
Summary
In most case, hacking is done in order to accomplish a particular objective that is outside outside that of the creators. A person who is consistently engaged in hacking activities…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Assignment 2: Hacking the AIS
Read TextPreview

Extract of sample "Assignment 2: Hacking the AIS"

Download file to see previous pages Business systems have also been a target by hackers due to the content of the critical information they might be holding in their systems. Among the vital business systems that were a victim of hacking is the Anthem Inc., a giant health insurance based in New York. Hackers had breached the business’s computer the personal information of tens of millions of customers and employees was at risk. Hackers infiltrated a database containing records of as many as 80 million people; accessing customers information. Some of the customer data might also have included details on their income. However, it appeared that the data stolen did not include medical information or credit card numbers of the customers (Aickelin et al., 2013).
The company’s response to this security breach was prompt. The company’s first response was immediate notification to the FBI after observing suspicious network activity. This action was necessary since it’s the responsibility of the company to guarantee the security of the data of their customers. Speed is a critical aspect when notifying law enforcement of an intrusion since cyber criminals has the ability to terminate important evidence that can be used to identify people who are responsible for a given act. The action of the company to react promptly after noticing suspicious activities on the web was imperative since it gave the security personnel adequate time to gather the necessary evidence in time before the hackers destroyed it. Subsequently, the company established a website where members could access information about the situation. This action was in responding to the security breach. Allowing the members obtain information about the status would also help report any developing of the situation to the security personnel that possibly could use in one way or another in identifying the hackers or recover the data (Bento & Bento 2014). Besides, the company also dedicated a toll-free ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assignment 2: Hacking the AIS Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Assignment 2: Hacking the AIS Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/finance-accounting/1689065-assignment-2-hacking-the-ais
(Assignment 2: Hacking the AIS Essay Example | Topics and Well Written Essays - 1250 Words)
Assignment 2: Hacking the AIS Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/finance-accounting/1689065-assignment-2-hacking-the-ais.
“Assignment 2: Hacking the AIS Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/finance-accounting/1689065-assignment-2-hacking-the-ais.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Assignment 2: Hacking the AIS

Fonterra Ltd, a diary company in New Zealand

...are to make business in the emerging economies like China, Latin America and ASEAN; thus creating a strong presence. Optimizing the business of milk in New Zealand, protect the exports of milk exports in New Zealand by building integrated offshore milk pools, so that the higher value returns gets back to the country; focusing on creating quality product for its customers with special concern for mother and babies (Fonterra Ltd., 2011, pp.2-20). Computer fraud and abuse Accounting information system is a process by which the accounting of the company is done based on the Generally Accepted Accounting Principles (GAAP) by the use of the modern information technology. The Accounting Information System (AIS)...
10 Pages(2500 words)Assignment

LASA 2/2

...?The Case For, or Against, New Orleans Part A The Economics of New Orleans: New Orleans is one of the main ports of the United s and it is the biggest city in the state of Louisiana. It is a very significant state for the country both financially and economically. “Strategically located near the mouth of the Mississippi River, New Orleans was one of the busiest ports in the U.S, serving more than 6,000 ocean-going ships annually” (Gagne, 2007, p.2). About 20% of all US exports are done via New Orleans, and furthermore, Louisiana is home to an important amount of natural gas and domestic oil production with a key access point for imported oil. “The port generated 107,000 jobs, with over $2 billion in...
6 Pages(1500 words)Assignment

Television and Internet

...Television, internet, radio, it. These persona and characters reign. First off: Hannah Montana. No kidding, who does not know her? She’s the girl who has the best of both worlds! This series that airs in Disney Channel is about Hannah, the girl who is living every teenage girl’s fantasy: rocking it out as a pop singer while enjoying the comfort of normalcy. I can’t help but think how similar those little girls’ adoration to Hannah with the days when a certain blond girl sang “Hit me baby one more time!”. Disney certainly knows how to market their star. Because of the very large fan base the hit teen sitcom went to have top grossing concerts and movies. It catapulted the lead star, Miley Cyrus, to up roaring fame. Still the success...
1 Pages(250 words)Assignment

2-1-2

...Lithuania Table of Contents Lithuania 3 Overview of Economy 3 Trends 4 Alternative measures of the economic well-being 4 References 5 Lithuania Lithuania is an Eastern European country. It shares its border with Russia and Latvia. Moreover there is Baltic Sea on the western side of the country. Till March, 1990 the country was a part of Soviet Union. On March 11, 1990 it declared its independence. Today, the country is a member of both EU and NATO. In 2009 the total population of the country was almost 3,331,194 (U.S. Department of State, December 2009). Government of Lithuania is democratic nature. Dalia Grybauskaite is the current president and Andrius Kubilius is the prime minister of the country. Overview of Economy Prior... Table of...
2 Pages(500 words)Assignment

Hacking for Dummies

...Hacking for Dummies In the current speedy advancing technological world, information privacy has become a subject of great concern all around the globe. To be precise, the rise in technology has been followed by significant hacker sophistication and advances use of viruses and Trojans to capture several essential user login details such as passwords. In this sense, it is a very good idea that an individual or organization uses a password safe since it plays a huge role in enhancing data security (Beaver 88). In simple terms, a password safe is a tool developed under Microsoft windows used specifically in storing customized user passwords thus protecting them from any unauthorized access. Other alternatives include...
1 Pages(250 words)Assignment

Week 2 discussion 2

...NASDAQ STOCK MARKET   NADAQ stock market NASDAQ COMPOSITE INDEX YEARLY RETURNS YEAR BEGINNING PRICE ENDING PRICE GAIN OR LOSS PERCENTAGE GAIN OR LOSS 2004 2003.37 2175.44 172.07 8.59% 2005 2175.44 2205.32 29.88 1.37% 2006 2205.32 2415.29 209.97 9.52% 2007 2415.29 2652.28 236.99 9.81% 2008 2652.28 1577.03 -1075.25 -40.54% 2009 1577.03 2269.15 692.12 43.89% 2010 2269.15 2652.87 383.72 16.91% 2011 2652.87 2605.15 -47.72 -1.80% 2012 2605.15 3019.51 414.36 15.91% 2013 3019.51 4176.59 1157.08 38.32% Introduction The NASDAQ stock market is an American securities exchange that is the second largest securities exchange worldwide by market value capitalization after the New York Securities exchange. Started in 1971, the stock market has... STOCK MARKET ...
6 Pages(1500 words)Assignment

Nonverbal Communication in Uncomfortable Situation

...Nonverbal Communication in Uncomfortable Situation Nonverbal communications constitute important aspect and technique ofcommunication. Nonverbal communications pass unspoken messages that tend to be concrete and likely to have long lasting impact in the content and nature of a given message. The magnitude of message or information conveyed through nonverbal communication is usually big and people need to be careful with the kinds of nonverbal techniques used. When in uncomfortable situation, nonverbal communications such as moody facial expression, disturbed posture, and confused use of gestures, indirect facial contact and unregulated body movements tend to dominate (Ungar, 2011). In counseling, the above listed nonverbal... Communication...
1 Pages(250 words)Essay

Managerial Applications of Technology (Ethical Hacking)2

...Managerial Applications of Technology (Ethical Hacking) As their goes, ethical hackers are hackers who comply with the expectations of an organization, thus cannot breach their operation codes (Hafelee, 2004). This means that their actions can be ethical and still effective in that they secure an organization’s IT system by detecting their faults and strengthening them. In securing their information systems, managers have to consider factors such as the sensitivity of the information (say like employees’ private data), who the information is being revealed to (the hacker), the potential reactions that may result if the information leaks, and finally the credibility of the parties entrusted with the provision of security....
1 Pages(250 words)Assignment

Computer Memory Hacking

...or techniques is inception. Using this technique, hackers present a serial bus protocol-2 using firewire interface to the machine of the targeted person. The operating system of the targeted computer connects the bus to the firewire port taking it as a SBP-2 device. The targeted device lowers its protection level because of the use of Direct Memory Access by the hacker. This helps the hackers to gain read/write access to the RAM of the targeted computer system. Another common tool used by hackers is Memory Hacking Software. Hackers can use this software to gain access to the memory of the computer systems. There are such software programs available on the internet that hackers can...
2 Pages(500 words)Assignment

WEEK 2 DQ 2

... ERG Theory and Maslow’s Hierarchy The needs of an individual influence the manner of their behavior. The ERG theory by Clayton Alderfer and the Maslow’s Hierarchy of needs by Abraham Maslow, have similarities and differences. One of the similarities of both theories is that they determine that the existence of needs acts as a motivation towards people’s behavior. Another similarity is that the results of the theories ensure the fulfillment of both physical and psychological needs of individuals (Baack, p. 23). In relation to the differences of the theories, the ERG theory determines that there exist three needs as compared to Maslow’s five needs in the hierarchy. Another difference is that the ERG theory considers a random... ERG Theory...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Assignment 2: Hacking the AIS for FREE!

Contact Us