Question

In: Operations Management

Tell of a cyber-security breach: What company, what happened, and what was the outcome? What are...

Tell of a cyber-security breach: What company, what happened, and what was the outcome? What are your thoughts about this security breach?

Solutions

Expert Solution

Walmart faced an email security breach when it allowed outside contractors access to their email networking system for monitoring purposes. This compromised confidential data and the company and its employees were investigated by the FBI.

The outcome of the above case was that the companies started taking their email security much more seriously and limited the access to any outsider technician to the private and confidential data to avoid future breaches.

I think when companies operating internationally and having a database of crucial and highly risky data, they should take extra steps to ensure that any person having access to the data is reliable and can be trusted. Without monitoring and validating the technicians, they should not be given access to such high-risk data.


Related Solutions

Find an example online of a cyber attack or breach that has happened within the past...
Find an example online of a cyber attack or breach that has happened within the past 3 years. Provide the link and summarize what you found. What type of threat was represented in this example? Why/how do you feel this occurred? What could have been done differently to protect against this threat?
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the differences with the help of appropriate examples. Please provide your own words. No copy from the internet. 150 to 200 words.
Write an abstract and Introduction for the case of Cyber Breach of Target case.
Write an abstract and Introduction for the case of Cyber Breach of Target case.
Find article on the internet about the cyber breaches. analyze article and post: What happened What...
Find article on the internet about the cyber breaches. analyze article and post: What happened What went wrong What tools are available to prevent issue/s from happening again Could it be prevented? What should be done from now onwards. 6. Also provide the reference links
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how...
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy. Compose an organizational security policy that protects the confidentiality , integrity , and availability of EQUIFAX DATA BREACH IN 2017 Original Question : Prompt: You will submit your creation of a cyber-security...
One of the security threats is confidentiality breach. Explain what it is, how it can be...
One of the security threats is confidentiality breach. Explain what it is, how it can be detected and how it can be prevented.
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber...
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber threat landscape. Yet the market for cyber security remains small, and organizations are making only tactical investments in cyber security measures—one of the reasons why there has been an increase in cyber-attacks. Evidence suggests that this trend will last for some time to come. However, the anticipation of an increasingly open and mobile enterprise should help refocus the spotlight on strategic investments in areas...
A security consultant has observed that the attempts to breach the security of the companys computer...
A security consultant has observed that the attempts to breach the security of the companys computer system occurs according to a Poisson process with a mean rate of 3 attempts per day. (The system is on 24 hours per day.) (a) What is the probability that there will be four breach attempts tomorrow, and two of them will occur during the evening (eight-hour) shift? could u recalculate using 1 probability i think the probability is p(4 breaches tom | 2...
A security consultant has observed that the attempts to breach the security of the companys computer...
A security consultant has observed that the attempts to breach the security of the companys computer system occurs according to a Poisson process with a mean rate of 3 attempts per day. (The system is on 24 hours per day.) (a) What is the probability that there will be four breach attempts tomorrow, and two of them will occur during the evening (eight-hour) shift?
Discuss Cyber Security as it relates to the role of the US government. Discuss Cyber Security as it relates to the responsibilities of the individuals who are involved in creating the technology.
(a) – Discuss Cyber Security as it relates to the role of the US government. (b)– Discuss Cyber Security as it relates to the responsibilities of the individuals who are involved in creating the technology.  
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT