Thursday, May 2, 2019

Cyber Security in Business Organizations Case Study - 1

Cyber Security in melodic phrase Organizations - Case Study ExampleHowever, taper had half a year prior to that installed malware detection dusts from the FEYE ready reckoner security firm (a very reputable provider with equally renowned clients, such as the Pentagon and the CIA). Target had an expert team at Bangalore to monitor the system securities at all times. In any final result of suspicion or malicious activity concerning system security, this monitoring group immediately informs the Minneapolis security operations center.On Saturday 30th November, when the hackers were putting in place the escape route of the data that was to be stolen, installed FEYE system spotted the malicious activity and the Bangalore team conveyed the sensitive information to the Minneapolis group, as was the stipulated protocol. However, the Minneapolis team failed to respond to the deprivation flag from Bangalore, and the theft of over forty million credit card numbers eventually occurred (Rile y, Elgin, Lawrence & Matlack, 2014, treat 13). The reasons why this warning was not acted upon are not clear at the moment, amidst a plethora of guess and on-going investigation. I believe the main reasons why the red flag was ignored were chiefly negligence concocted with a lazy hubris from the assumption that the security system that had detected the malware in the first place would inevitably as well halt any such attempts on its own. Perhaps they wrongly assumed that the system could not be hacked into as a result of the technology they had in place, confident that such attempts were feeble and futile. This is a continual failure of most cyber security personnel (Augastine, 2007).According to the email statement issued by Gregg Steinhafel (the chairman, president and chief executive officer of Target), Target had, in the wake of the hack, performed a thorough review of its employees, technology and processes so that they are ameliorate placed to improve their system securit y and gain valuable lessons from the unpalatable event. This is actively

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.