Nobody downloaded yet

Cyber Security in Business Organizations - Case Study Example

Comments (0) Cite this document
Aftermath analysis and investigations into what is perhaps the greatest retail hack in the history of the United States reveals that the act was not really unavoidable or was it a superiorly skilled undertaking. In fact, revelations point to the fact that the event would have…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Cyber Security in Business Organizations
Read TextPreview

Extract of sample "Cyber Security in Business Organizations"

Download file to see previous pages However, Target had half a year prior to that installed malware detection systems from the FEYE computer security firm (a very reputable provider with equally renowned clients, such as the Pentagon and the CIA). Target had an expert team at Bangalore to monitor the system securities at all times. In any event of suspicion or malicious activity concerning system security, this monitoring group immediately informs the Minneapolis security operations center.
On Saturday 30th November, when the hackers were putting in place the escape route of the data that was to be stolen, installed FEYE system spotted the malicious activity and the Bangalore team conveyed the sensitive information to the Minneapolis group, as was the stipulated protocol. However, the Minneapolis team failed to respond to the red flag from Bangalore, and the theft of over forty million credit card numbers eventually occurred (Riley, Elgin, Lawrence & Matlack, 2014, March 13). The reasons why this warning was not acted upon are not clear at the moment, amidst a plethora of speculation and on-going investigation. I believe the main reasons why the red flag was ignored were chiefly negligence concocted with a lazy hubris from the assumption that the security system that had detected the malware in the first place would inevitably also halt any such attempts on its own. Perhaps they wrongly assumed that the system could not be hacked into as a result of the technology they had in place, confident that such attempts were feeble and futile. This is a recurrent failure of most cyber security personnel (Augastine, 2007).
According to the email statement issued by Gregg Steinhafel (the chairman, president and CEO of Target), Target had, in the wake of the hack, performed a thorough review of its employees, technology and processes so that they are better placed to improve their system security and gain valuable lessons from the unpalatable event. This is actively ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cyber Security in Business Organizations Case Study - 1”, n.d.)
Cyber Security in Business Organizations Case Study - 1. Retrieved from
(Cyber Security in Business Organizations Case Study - 1)
Cyber Security in Business Organizations Case Study - 1.
“Cyber Security in Business Organizations Case Study - 1”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cyber Security in Business Organizations

Cyber Security

...confidentiality of message by using secured protocol links, and never save passwords or any other secreted information in plain alphabets. (J.D. Meier, A. Mackman, M. Dunner, S. Vasireddy, R. Escamilla and A. Murukan (Janaury 2006)) Anti Virus Software- an Antivirus software is made so that it can detect viruses and then prevent them from harming your operating system by fixing them. They are an all time countermeasure. (Conrad, E., Misenar, S., & Feldman, J. (2010)) You as an organization have to eschew these types of situations that are the reason you need to know about cyber safety and what to do to save yourself and your computers from these vulnerabilities. You have to find out how...
10 Pages(2500 words)Coursework

Cyber security

...? Cyber Security Organizational business mission and related security goals Intellectual property is a juridical concept that refers to creative formations of the mind that have exclusive rights. Owners of the creations are granted exclusive rights on intangible assets as stipulated in the intellectual property law on intangible creations such as music, works of art, inventions, designs, symbols and innovations. Examples of intellectual property rights include trademarks, copyrights, patents and industrial design rights. In the current international economy and business environment, companies hold their intellectual assets as their most valid assets, the...
4 Pages(1000 words)Coursework

Cyber security

...the confidentiality of the United States security and official data. The United States cannot try him since there is no international rule that considers his actions a crime. Additionally, national rules and laws of a single state cannot be applied to citizens of other countries. It is extremely essential that cyber security be considered a vital issue in a meeting of the United Nations. In the meeting, it is anticipated that the organization should declare cyber breaching and leaking a global crime, so that the trial of those culprits should be undertaken by the aggrieved countries, irrespective of the geographic boundaries. Additionally,...
2 Pages(500 words)Coursework

Cyber security

...that is not linked to a specific business corporation on purpose (Bandy, Money, & Worstell, Intrusion Detection FAQ: What is a honeypot? Why do I need one?, 2013). It is an admitted fact that the honeypots can be very helpful to business corporations that have considerable resources to maintain them. However, if an organization does not have a security expert to strictly keep an eye on a honeypot the organizations has, at finest, built a susceptible platform that is not checked regularly as well as at worst, a platform that can be occupied and employed by any hacker to attack other systems. Moreover, there is a possible legal responsibility inbuilt in...
1 Pages(250 words)Coursework

Cyber Security is used to denote cyber security. Effective cyber security employs coordinated efforts throughout the information system. Some of the major elements of cyber security include end-user education, application security, disaster recovery/ business continuity planning, network security and information security (Marshall, 85). World governments devote huge sums of their annual budgets towards enhancing cyber security with the United States in particular, since 2010 allocating over 13 million USD annually for the...
1 Pages(250 words)Essay

Cyber Security

...Cyber Security Cyber Security Today, business and personal operations depend on computers and technology. With the innovation of internet and high levels of computer programming, organizations are dependent on computer programs to make their operation smoother, less time-consuming and error free. Various services like banking and finance, personal investment, clothing stores or any other electronic or non-electronic products access consumer by simply logging on to the internet. US President Barack Obama in mentioned in a speech “Technology is reshaping every aspect of our lives, and protecting our digital infrastructure from cyber threats is one of our highest security priorities” (Martin, 2013). With the development of science... and...
10 Pages(2500 words)Term Paper

Cyber Security and Business

...that motivates and endorses incentives for organizations to adopt broadly needed sound security practices. Thus, offering support for research required to improve future national protection and articulating to organizational managers the need to invest in cyber security in order to improve the nation’s security because a secure nation is an ideal place to do business (Heiman 99). Effects on national security due to exceeding the minimum requirements The impact of cyber security regulation on national security due to exceeding minimum requirements...
6 Pages(1500 words)Term Paper

Cyber Security

...Cyber Security Stuxnet is a computer virus designed specifically to aid hackers attack industrial plants without the knowledge or identification of the operators. It is the first attack that grants the hackers the opportunity of manipulating world equipment and as a result of this, it is very dangerous. Stuxnet is a product of the U.S and Israel project (Bacrach, 2013). Its impact is well known; it destroyed approximately 20% of Iran’s nuclear centrifuges through making them spin uncontrollably. It also infected a Russian nuclear power plant very badly. In tandem to this, the paper aims at providing detailed information on how Stuxnet was introduced to Iran’s and Russian power plants, how it spread to the...
3 Pages(750 words)Essay

Cyber Security

...Cyber Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain...
1 Pages(250 words)Essay

Cyber Security in Business Organizations

...Cyber Security in Business Organizations Cyber Security in Business Organizations Information security is a growing challenge among organizations that have implemented information systems. With the incorporation of information technology into organizational operations, corporations have become vulnerable to a plethora of information security risks. Failure of information systems can cost organizations heavily in the form of declining consumer trust, monetary losses, and deteriorating shareholder confidence. Johnson and Goetz (2007)...
5 Pages(1250 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Cyber Security in Business Organizations for FREE!

Contact Us