Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In fact, for every 10SMBs, at least three are not taking any measures to protect their business against security threats, leaving private data exposed to

In fact, for every 10SMBs, at least three are not taking any measures to protect their business against security threats, leaving private data exposed to cybercriminal activity. With the median fraud loss for a small to medium-sized business coming in at about $200,000, many SMBs that are breached have no other option but to close up shop. And disturbingly, only 12% of SMBs have a breach preparedness pan in place.

 

To demonstrate just how effortlessly cybercriminals are targeting and exploiting SMBs, CSID reinforced the need for data breach mitigation by executing an experiment. The idea? Develop a mock business, build its presence online and watch as it becomes a target for real cybercriminals to hack. And thus, Jomoco was born, a fictitious coconut water company with two fabricated employees, Rachel and Richard. CSID established the virtual presence of Jomoco in a similar way a start-up would: buy a URL, set up a web server and create employee business email addresses. The team developed additional personal profiles for Jomoco's two employees-an Xbox Live account for Rachel, a Facebook account for Richard, and personal emails for both- to mimic the cyber footprints that might exist for genuine small business owners.

 

Questions

1. Explain phishing attacks with an example.

2. List and explain four security threats that Jomoco may face. 

3. Jomoco started up by purchasing a URL, web server and emails. A website is designed and built for the organization. What security measures can be implemented to protect the website vigorously. List and explain two security measures. 

Step by Step Solution

3.41 Rating (154 Votes )

There are 3 Steps involved in it

Step: 1

1 Phishing attacks are a type of cyber attack in which cybercriminals impersonate a trustworthy source to trick individuals into sharing sensitive inf... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing and Assurance services an integrated approach

Authors: Alvin a. arens, Randal j. elder, Mark s. Beasley

15th edition

978-0133125634, 9780133423815, 133125637, 133423816, 978-0133125689

More Books

Students also viewed these Accounting questions

Question

Explain with example inter-thread communication techniques.

Answered: 1 week ago

Question

Determine for the following: a. b. c.

Answered: 1 week ago