Question

In: Computer Science

Your readings for this week have discussed databases, data breaches, and networking security in the business...

Your readings for this week have discussed databases, data breaches, and networking security in the business world. Find a major data breach within the last 2 years and do some research explain how and why the breach occurred, what information was accessed, and how this information could be misused. Has the incident been fully resolved or are there ongoing security issues with the company or customer information? Remember to include references to your readings and an article from the web to support your post. Do not use the same data breach as someone else. Include the name of the business or entity impacted by the data breach in the subject line of your discussion.

Solutions

Expert Solution

Answer)
This was the latest safety violation that took place during a shopping website attacks in the last year. Amazon.com is the website we know about e-commerce. Both buyers and vendors are Amazon clients, and Amazon is just a platform for both. In the recognized violation of safety, certain user accounts data have been accessed from the server attacks and e-mail and password from the customer account were used to post fake deals on Amazon at high rates.

Hackers changed the sellers' bank account details as a result of which the customers who deposited the money were deposited into the hackers' account stealing thousands of dollars.

Other companies can learn from the lessons. As stated above, the data obtained from one breach helped to steal money and user data for another breach. Thus companies should take appropriate action when a data breach occurs and ask users to change credentials when the servers have been hacked.

Companies should also have more than enough tools in place and protection against all kinds of attacks that can occur on the Internet, as well as assigning an expert team on the same job. A security breach can also affect small businesses at all times. This is because small businesses operate on a margin. The customer or customer information stolen from the company will induce less confidence among users to use the company for later services. The customers will also be attracted to some other service company to which the hacker sells the information.

Personal information of customers is always confidential, revealing such personal information can affect the small business that is trusted to handle personal data.

Companies should take appropriate action when a data breach occurs and ask users to change credentials when the servers have been hacked. They should emphasize what was wrong with the thing that allowed the breach and correct it for the future so that nothing like it can happen in the future. Companies should have more than enough tools in place and protection against all kinds of attacks that can happen over the Internet, as well as assigning an expert team on the same job. The team will monitor suspicious activities that risk the confidentiality of customer data.

In my opinion, the security was poorly managed by Amazon as even after the leakage of credentials from the amazon server attack, Amazon did not take any steps to mitigate the risks or inform the specific user to change their passwords, which could well have averted the situation. Law enforcement should be in contact in cases where the seller, service provider and people or buyers have broken the law and raise a complaint and lodge a case against Amazon and the sellers for getting the money back. Law enforcement can be contacted at any time when illegal activity is taking place, like this example above is one of those illegal activities.


Related Solutions

Business Networking In one of your readings this week, "Business Networking Tips and Techniques for Networking...
Business Networking In one of your readings this week, "Business Networking Tips and Techniques for Networking Events and Networking Websites", describe one of the ten essential principles and how you would apply it to yourself. Also, Why is networking so important to job seekers? With whom, where, and when should you network? Who are the best kinds of contact networks? What people should be in your network? What is the biggest mistake a job seeker can make with networking?
Choose two nursing theories discussed this week in your readings. Compare both in terms of concepts,...
Choose two nursing theories discussed this week in your readings. Compare both in terms of concepts, assumptions, implications, and application.
In recent years, some firms have suffered large data breaches, increasing the focus on cyber security....
In recent years, some firms have suffered large data breaches, increasing the focus on cyber security. Find an example of a firm that sufferer a data breach. How effectively did it manage the aftermath of the breach? How could an insurer be helpful?
Week 8 Discussion Consider the different post hoc tests discussed in the readings and respond to...
Week 8 Discussion Consider the different post hoc tests discussed in the readings and respond to the following: Describe the general rationale behind using post hoc tests (i.e., when they are used and why). One of the advantages of using an ANOVA (compared to using t-tests) is also a disadvantage—using an ANOVA makes it necessary to use post hoc tests if there is a significant main effect. We use a post hoc test because there is one specific advantage in...
One of the readings this week is an article published in a blog by Business Finance...
One of the readings this week is an article published in a blog by Business Finance which compares managerial accountants to cowboys in the Wild West. The main argument provided by the author stems from the many rules imposed on financial accountants and the comparative lack of rules for managerial accountants. In BUSI 1043 (Financial Accounting) we learned about the effects of Enron, World Com, and Arthur Anderson as well as many other companies who committed fraud and the resulting...
This week, your book discussed the importance of financial statements. For your post this week, I...
This week, your book discussed the importance of financial statements. For your post this week, I want you to discuss the importance of financial statements to managers, and to outside parties. Also, I would like you to explain the difference if the hospital is a for-profit, or not-for-profit organization. Write a minimum of 250 and a maximum of 300 words.
Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably health care...
Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably health care related related data. Describe the incidents and explain what could have been done to prevent or mitigate them.
This week we discussed and defined the types of business structures along with their advantages and...
This week we discussed and defined the types of business structures along with their advantages and disadvantages. On page 2 of the attached document, there is a Business Structure Chart where you will be filling in the definitions and advantages & disadvantages of each business structure. On the chart under the category of sole proprietary, a partial example has been started to show you how to fill in the chart. After you have completed the chart,you will need to answer...
Textbook: Business Data Networks and Security In your browser you enter the URL of a website...
Textbook: Business Data Networks and Security In your browser you enter the URL of a website you use every day. But today after some delay you receive the infamous 404 Host Not Found error message. What are some of the many possibilities that can cause this problem. List at least 3 that are directly related to the components of TCP/IP communications and how you might troubleshoot each one. (It may be helpful to refer to Chapter 1A to identify some...
In your readings for this week, you learned about the digital divide. Indeed, on multiple occasions...
In your readings for this week, you learned about the digital divide. Indeed, on multiple occasions we hear phrases like "everybody is connected these days" or "everybody is online". However, despite popular beliefs of ubiquitous internet connectivity this is not quite how the real world works. What I want you to do for this week is to think of examples showing the digital divide you are familiar with from your own life, readings, news local experiences, etc. and then comment...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT