100% (1)
Pages:
2 pages/≈550 words
Sources:
10
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.15
Topic:

Firms Who Have Been Hacked

Essay Instructions:

***NOTE-There is already a written paper on this site for the exact topic and questions. PLEASE write an original one to this topic, , NO Plagiarism please!!!***. After reading and analyzing the following articles and related material and believe that you have a reasonable understanding of the hacking situations, compose in relation to the below readings, then write, answer and discuss in depth a 4 or more FULL page paper on the following topic: (PLEASE Not 3 and a 1 one half pages, 4 FULL pages please or more, please write a little more if you can):;;;_______________

TOPIC::__

"""The best alternative(s) available to these firms who have been hacked and how to resolve their security crisis""



Clearly, there are multiple possible answers that you probably will find during your research on this issue; there’s no one necessarily best answer, although it is pretty clear that good solutions will have to be both social and technical (i.e., sociotechnical) in nature. Your paper will be assessed primarily on how well you are able to support your viewpoint with the literature and the evidence. Obviously, as noted below, this will obligate you to actually be able to present such evidence in an academically respectable manner.



***BACKGROUND on assignment***

Starting in the spring of 2014, eBay was subjected to a series of security intrusions into its database of user passwords. The breach occurred when hackers compromised some employee login credentials, giving them access to the eBay system. It took over two months for eBay to know it had been compromised. The eBay hack came on the heels of the massive Target hack. Target’s security center was warned of the invasion but did nothing. At Neiman Marcus, alarms were set off as credit card data was being stolen. Sony with its enormously large and successful Cloud-based gaming system, the PlayStation network, also was attacked. Intrusions resulted in compromising financial data, including credit card numbers, for literally millions of participants. Moreover, this was not a single giant assault, but a series of recurring attacks (apparently conducted by a collective) that Sony's security experts seem to have been unable to stem. The result has been huge financial losses for the company and, potentially more seriously, damage to its reputation that it may never be able to repair.



Read about these hacks in the following articles:



Undoubtedly, you will do some further research on this situation. A good place to begin would be googling a search term such as "Sony security problems" or some variant on that theme, and then following leads as they seem interesting to you.



Now you should consider some of the things that the security experts say about such challenges. Here are two useful articles that discuss information security in the context of Cloud-based systems, and how to respond to incidents:



#1.)__Rudman, R.J. (2010). Incremental Risks in Web 2.0 Applications. The Electronic Library, 28(2), 210-230. [ProQuest]



#2.)__Lanois, Paul. (2011). Privacy in the age of the cloud. Journal of Internet Law. 15(6), 3-17. [ProQuest]



In addition, the optional readings expand on many of the central points; you may also want to do some independent research of your own to clarify any issues that concern you.



As we noted before, if you don't really pay attention to this material, it's really unlikely that you can write an acceptable paper on the topic below, let alone an exceptional one. We spend quite a lot of time trying to identify useful sources for you that bear on our topics for analysis; while we strongly encourage you to conduct your own further research and identify additional useful sources, this should be an add-on to the basic material rather than a substitute for it.



BACKGROUND READINGS you must read and MUST cite:

#1.)_Mac, Ryan (2014). California joins other states in investigation of EBay hack.http://www(dot)forbes(dot)com/sites/ryanmac/2014/05/23/as-ebay-notifies-users-of-hack-states-launch-investigation/



#2.)__Riley M., Elgin, B., Lawrence, D., and Matlack. C. (2014). Missed alarms and 40 million stolen credit card numbers: How Target blew it. March 13, 2014. http://www(dot)businessweek(dot)com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data



#3.)__Elgin, B., Lawrence, D., and Riley, M. (2014). Neiman Marcus hackers set of 60,000 alerts while bagging credit card data, Feb 21, 2014. http://www(dot)businessweek(dot)com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-data



#4.)___Mills, E. (2011) Attacks on Sony, others show it's open hacking season. CNET News. Retrieved June 13, 2011, from http://news(dot)cnet(dot)com/8301-27080_3-20069995-245/attacks-on-sony-others-show-its-open-hacking-season/#ixzz1PHwIH7dt



#5.)__Mills, E. (2011) Who is behind the hacks? (FAQ). CNET News. Retrieved June 14, 2011, fromhttp://news(dot)cnet(dot)com/8301-27080_3-20071100-245/who-is-behind-the-hacks-faq/?tag=rtcol;inTheNewsNow



ALSO Cite 2 additional scholarly sources. 



Please write a "Master/Graduate Level/PHD" A++paper please, scholarly writing. No rush but the sooner the better, Thank you.

Essay Sample Content Preview:
The best alternative(s) available to these firms who have been hacked and how to resolve their security crisis
Student:
Professor:
Course title:
Date:
The best alternative(s) available to these firms who have been hacked and how to resolve their security crisis
In the last few years, big firms have suffered serious cyber attacks that compromised confidential information of their customers and resulted in considerable financial losses and damaged the reputation of these firms. Some of these companies include eBay in which cybercriminals hacked into its database of user passwords (Mac, 2014); Target and Neiman Marcus in which sensitive credit card information was stolen by hackers (Elgin, Lawrence & Riley, 2014; Riley et al., 2014); and most recently in 2014, Sony, whose several sites were shut down by a group of hackers called Anonymous (Mills, 2011a; Mills, 2011b). In order to prevent another attack, these firms should do the following:
Ensuring that all computers of the company are up to date
This is an easy strategy that the affected firms could implement so as to prevent cybercriminals from hacking into their systems another time. Keeping computers up to date will mean paying attention to notifications with regard to updates to the company’s operating system, antivirus software, web browsers, and firewalls (Scully, 2013). If these notifications are ignored and the company postpones following through with security updates, then it would leave cracks in its security defence system.
Use strong passwords for everything
Security experts have noted that if the password for use for various things such as social media accounts, email as well as other business software could be found inside a dictionary, for instance the word password, hackers can hack it in about 30 seconds (Rudman, 2010). Strong passwords need to be at least 14 characters in length if the company wants to make its security system very difficult to crack. Furthermore, it is important to utilize a mix of symbols, numbers and lowercase and uppercase letters. Employees should be advised to utilize different passwords for each account they have such as email, PayPal, or Facebook, or for each site (Borrett, Carter & Wespi, 2013). Passwords should not be stored in places that someone can find them easily, such as on the desktop or in the email inbox.
Train employees on Cyber Security practices
In-house staff members are generally accountable for 40% of security breaches in companies (Knapp, 2015). The companies should spend time to train and educate their employees on the various kinds of cyber attacks and the way they could help in preventing these internet attacks. It is recommended that the companies should train their staffs on Information Technology risk; put someone in charge of security; and develop simple and explicit company policies with regard to technolo...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!