StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Assignment 2: Hacking the AIS - Essay Example

Cite this document
Summary
In most case, hacking is done in order to accomplish a particular objective that is outside outside that of the creators. A person who is consistently engaged in hacking activities…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Assignment 2: Hacking the AIS
Read Text Preview

Extract of sample "Assignment 2: Hacking the AIS"

Download file to see previous pages

Business systems have also been a target by hackers due to the content of the critical information they might be holding in their systems. Among the vital business systems that were a victim of hacking is the Anthem Inc., a giant health insurance based in New York. Hackers had breached the business’s computer the personal information of tens of millions of customers and employees was at risk. Hackers infiltrated a database containing records of as many as 80 million people; accessing customers information.

Some of the customer data might also have included details on their income. However, it appeared that the data stolen did not include medical information or credit card numbers of the customers (Aickelin et al., 2013). The company’s response to this security breach was prompt. The company’s first response was immediate notification to the FBI after observing suspicious network activity. This action was necessary since it’s the responsibility of the company to guarantee the security of the data of their customers.

Speed is a critical aspect when notifying law enforcement of an intrusion since cyber criminals has the ability to terminate important evidence that can be used to identify people who are responsible for a given act. The action of the company to react promptly after noticing suspicious activities on the web was imperative since it gave the security personnel adequate time to gather the necessary evidence in time before the hackers destroyed it. Subsequently, the company established a website where members could access information about the situation.

This action was in responding to the security breach. Allowing the members obtain information about the status would also help report any developing of the situation to the security personnel that possibly could use in one way or another in identifying the hackers or recover the data (Bento & Bento 2014). Besides, the company also dedicated a toll-free

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assignment 2: Hacking the AIS Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Assignment 2: Hacking the AIS Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/finance-accounting/1689065-assignment-2-hacking-the-ais
(Assignment 2: Hacking the AIS Essay Example | Topics and Well Written Essays - 1250 Words)
Assignment 2: Hacking the AIS Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/finance-accounting/1689065-assignment-2-hacking-the-ais.
“Assignment 2: Hacking the AIS Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/finance-accounting/1689065-assignment-2-hacking-the-ais.
  • Cited: 0 times

CHECK THESE SAMPLES OF Assignment 2: Hacking the AIS

Strategic Audit of Thales Transportation in China

Strategic Audit: Thales Transportation Solutions Strategic Audit of Thales Transportation in China Executive Summary Strategic management helps in learning the surrounding environment of businesses, which in return help businesses to take critical decisions to neutralize the impact of any alteration in the internal or external environment....
10 Pages (2500 words) Assignment

Managerial Applications of Technology (Ethical Hacking)2

This means that their actions can be ethical and still effective in that they secure an organization's IT… In securing their information systems, managers have to consider factors such as the sensitivity of the information (say like employees' private data), who the information is being revealed to (the hacker), the potential Managerial Applications of Technology (Ethical hacking) As their goes, ethical hackers are hackers who comply with the expectations of an organization, thus cannot breach their operation codes (Hafelee, 2004)....
1 Pages (250 words) Assignment

Computer Memory Hacking

This essay analyzes hacking, that has become so common in today's world that almost every person who uses computer and internet can be a victim of hackers.... Another common tool used by hackers is Memory hacking Software.... There is a huge significance of hacking in organizations and modern society.... hacking sometimes proves to be very disastrous because it provides access of files to the strangers who can use the information for illegal purposes....
2 Pages (500 words) Assignment

Critically Evaluate article-Alfred Binet

Siegler asserts that Alfred Binet's less known works in psychology deserve equal recognition and further studies too.... In “The Other Alfred Binet,” Siegler reviews Binet's primary contributions to… ology, explores why his intelligence scale was more prominent than other works, and understands the place of his contributions in determining early cognitive development's processes and unifying theories about cognition and cognitive development....
2 Pages (500 words) Assignment

London Ambulance Service

This paper "London Ambulance Service" discusses London Ambulance Service (LAS) that has implemented a new system that is rule-based with an automatic analytical approach.... The previous working style of the London Ambulance Service was semi-automatic.... hellip; This new system takes the information from ambulance crews for the formation of possible decisions....
8 Pages (2000 words) Assignment

What Is Figure-Ground and Why Is It Associated with Selection

From the paper "What Is Figure-Ground and Why Is It Associated with Selection" it is clear that the method of creating a visual hierarchy is by providing entry points to the instruction.... This involves the use of figure and ground to allow the reader to assimilate one element first and the other next....
6 Pages (1500 words) Assignment

Space of Flows - Castells's Concept

The paper “Space of Flows - Castells's Concept” offers some means to control terrorism.... If the data flow as part of the space of flows is checked by special controllers, then barriers could be set to the available electronic data, so that actions of terrorism are prevented as possible....
9 Pages (2250 words) Assignment

Hospitality Problems of Hilton

"Hospitality Problems of Hilton" paper states that Property rooms require greater attention to ensure that people deal with issues as they arise.... The impact this room has on a hotel as big as the Hilton is profound given the number of properties that require attendance.... hellip; The main aim is to recreate a new chart that organizes the property room to meet the demands of the massive investment (Gee and Singh 278)....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us