Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Background Info: When global firms like Home Depot, Office of Personnel Management, and Target become prime targets for hackers, the attack themselves become front-page news.

Background Info:

When global firms like Home Depot, Office of Personnel Management, and Target become prime targets for hackers, the attack themselves become front-page news. Financial and personal data have been compromised despite firms having measures in place. You will review three firms (only one firm being the Home Depot, OPM, or Target breach) where a successful attack was made on their systems by hackers. In terms of the second & third firms, you are free to select a breach/attack that occurred within the last three years. Do not use the Solar Winds breach for one of your firms.

Section I (Facts of Case #1): You will describe what happened and how did the firm respond to the breach/attack. Also, you will identify and discuss how consumers reacted to the breach/attack. Finally, assess how much responsibility should lie with the firm per this breach/attack.

Section II (Facts of Case #2): You will describe what happened and how did the firm respond to the breach/attack. Also, you will identify and discuss how consumers reacted to the breach/attack. Finally, assess how much responsibility should lie with the firm per this breach/attack.

Section III (Facts of Case #3): You will describe what happened and how did the firm respond to the breach/attack. Also, you will identify and discuss how consumers reacted to the breach/attack. Finally, assess how much responsibility should lie with the firm per this breach/attack.

Section IV (Prevention): Identify and discuss at least three measures firms must take to limit/prevent breaches and attacks from happening. One of your preventive measures must be a technology-based measure, such as robotic processing automation (RPA), blockchain, artificial intelligence (AI), or data analytics would have prevented/limited the impact of data breaches.

Section V (Role of the Government & Others): In this section, discuss the role that the Federal Government and large associations (e.g., ISACA, AICAP, IIA) should play regarding preventing/limiting breaches. Be sure to speak about the Government first and then pick an association to discuss.

Section VI (Lessons Learned - Solar Winds): Do some research on the Solar Winds breach and discuss what can we learn from this high-profile breach.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Financial Accounting And Reporting

Authors: Barry Elliott, Jamie Elliott

5th Edition

0273651560, 978-0273651567

More Books

Students also viewed these Accounting questions

Question

How are most students funded?

Answered: 1 week ago

Question

How do we do subnetting in IPv6?Explain with a suitable example.

Answered: 1 week ago

Question

Explain the guideline for job description.

Answered: 1 week ago

Question

What is job description ? State the uses of job description.

Answered: 1 week ago

Question

What are the objectives of job evaluation ?

Answered: 1 week ago

Question

Write a note on job design.

Answered: 1 week ago