Friday, December 20, 2019

The Threat Of Cyber Security - 1452 Words

Dakota Stern May 8, 2017 Executive Briefing Executive Summary â€Å"When the Target data breach occurred in 2013, the response was surprising as it took too much time to manage the consumer fallout. Watching communications unfold over time, I assumed that lawyers must have managed the response, because marketers would have handled it differently--focusing effort on mitigating consumer trust damage, brand damage, and negative financial consequences.† Introduction Purpose The purpose of this briefing is to: †¢ Clarify the importance of cyber security in marketing †¢ Educate employees on the importance of cyber security in the workplace †¢ Explain to marketer why they are targets of cyber security attacks †¢ Educate employees on how they can prevent†¦show more content†¦Finally, a single academic source was used to outline how cyber threats can be detrimental to systems outside of consumer based organizations. In order to completely understand the gravity of the future of cyber security, interviews were sought out first in order to create a first-hand understanding of the problem at hand. From the interviews reviewed to create this briefing, Holly Rollo gave us the most in depth answers to the questions we were looking to get answers to. We selected marketing departments for two reasons after reading a series Kimberly Whitler, a former CMO and current Assistant Professor at the University of Virginia’s Darden School of Business, posted on Forbes. The first reason is that according to Holly, marketing departments handle sensitive information about customers that can be valuable targets for hackers. Secondly, no one thinks to put IT and marketing in the same sentence, so marketers usually never think about security. Results/Findings What is a data breach? A data breach, in simplified terms is â€Å"a disclosure of information to an unauthorized party† (Whitler, A Wake-Up Call To CEOs And Marketers: The Perfect Cyber Security Storm Is Approaching, 2016). To be more specific, an attack can be broken up into three types; a breach, compromise, or intrusion. Each are defined below: 1. Intrusion: Unauthorized access to networks or systems 2.Show MoreRelatedCyber Security And Cyber Threats Essay1510 Words   |  7 Pagesbeen confronting issues of cyber-attacks to such an extent that majority of the patients feel every moment that they are at great risk and thus their treatment processes suffer a lot.(Hacking Healthcare IT in 2016) The small sized clinics do not have many resources to enhance their information security systems. Even the large sized enterprises are vulnerable to the cyber threats. The White House had declared that it would increase opportunities to tackle the cyber threats in every sphere, but the moreRead MoreCyber Security And The Cyber Threat763 Words   |  4 Pagesdeal with the impact of the cyber-threat. With this in mine, security awareness training is economical and obvious choice for organization of all sizes. Many companies invest heavily in cyber security education programs for all employees to learn how to protect their computers and personal information and how to be aware of the cyber cri minals that sour the Web in search of targets and vulnerabilities. For the most part the training should include educating users on security concepts such as be conversantRead MoreThe Threat Of Cyber Security4382 Words   |  18 Pages2013).These days it takes merely minutes for news to travel around the globe. Our airwaves are filled with tiny nuggets of information whooshing past us undetected; that is, until it is detected. In the 21st century, cyber security is an international issue. The threat of cyber warfare is very real and would be devastating beyond any conventional weapon imaginable. With the entire globe becoming more interconnected, an attack on online infrastructure could ground airplanes, control informationRead MoreThe Threat Of Cyber Security3043 Words   |  13 PagesABSTRACT While many organizations focus their security efforts on their network border, it is the insider that perhaps poses the most risk to cyber-security. An Insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization s security practices, data and computer systems. The threat may involve fraud, the theft of confidential orRead MoreThe Threat Of Cyber Security1351 Words   |  6 Pagesthe technology from ten years ago, even to the point in which a single cyber-attack can cause the death of millions of people. For that reason, cyber security has become one of the most important matters for many countries. There is no doubt that the United States is one of the most technologically advanced and more powerful countries in the world and for that same reason it instantly becomes one of the main target of cyber-attacks. In o rder to maintain the country safe and defend against attacksRead MoreThreat Vectors For Cyber Security965 Words   |  4 PagesThreat Vectors There are three main areas identified as threat vectors for cyber security in relation to CIP: IT networks, insider threats, and equipment and software. Normally, ICS operate on an internal network, called OT (Operational Technology). Occasionally, this isolated network requires a connection to the organization’s corporate network (IT) for routine operation and management. As displayed in the Ukraine blackout, cyber threats infiltrate an organization’s IT systems in order to accessRead MoreThe Threat Of Cyber Security2050 Words   |  9 Pagesage, the risks of cyber-attacks have seemingly become more prevalent through aggressions done by both foreign and domestic terrorists acting out in response towards either religious, political, or financial consciences. These attacks consist of hackers possessing abilities that can alter digital perspectives of banking and also the capability to adjust physical aspect like water systems and even nuclear power plants. The relevance in emphasizing the importance of cyber-security is directly relatedRead MoreCyber Security Threats And Crimes1279 Words   |  6 Pages Cyber security threats/crimes Before people even knew you could do so much with computers and internet beside common work activity before it got popular and admired, criminals had to get a lot more personal when retrieving their personal information like dig through trash, steal or break into their mailboxes, are buy it from a somebody who sold other people identity was some of the way criminal got people personal information. Now many of people aroundRead MoreCyber Warfare And Security Threats2770 Words   |  12 Pagesbecome prey to attackers and has given birth to a new era of Cyber warfare. Consequently, the Internet, computers and networks have become targets and vehicles of cyber attacks and generate challenges to our security privacy. Cyber Warfare presents an ever-increasing amount of security threats, which continue to escalate with increasing harshness, and is now a critical issue in our technology realm and a growing threat to the world. Cyber wars are generally politically or economically motivated, withRead MoreCyber Security : The Threat Of The Digital Age1811 Words   |  8 Pagesgreatest threats to our national security revolve around that of a computer network. These networks are vulnerable to human error, negligence, and internal sabotages. In the years of 2014 and 2015 the United States Intelligence Community’s threat assessment placed cyber security as the top priority. External attacks on computer mainframes and data networks that contain critical intelligence are being recognized as the nation’s most vulnerable weakness and steps must be taken to combat the threat of the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.