Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Search your institutions published documents, including its Web pages. Locate its mission statement, vision statement, and strategic goals. Identify any references to information security. Also

Search your institutions published documents, including its Web pages. Locate its mission statement, vision statement, and strategic goals. Identify any references to information security. Also look for any planning documents related to information security.Search your institutions published documents, including its Web pages. Locate its mission statement, vision statement, and strategic goals. Identify any references to information security. Also look for any planning documents related to information security.

This is the answer that already exists. Please, i need a new one.

For the above purpose I have chosen one of the most famous and vastly used companies "Adobe" and will write the whole description as below:

  1. Mission statement:
    • The mission statement of Adobe is as follows:
      • They want to be one of the premier provider of the services and the products in the age of information for professional publishing solutions in the organization addressed market segments.
      • They also want to achieve and maintain above-average returns on the investment for the shareholders, investors, etc.
  2. Vision Statement:
    • The vision of Adobe is as follows:
      • They want to revolutionalize how the world is engaging with the ideas and the information.
  3. Goals:
    • Adobe is quite progressive about their goals and has some very definite goals. They are as follows:
      • Better Integration services
      • Open & Extensible Platform
      • Rich Data Models
      • No more hassles in data storage and collection
    • Hence, these are some of the defined goals of the organization.
  4. Information Security:
    • I have found recent data on the information security of Adobe and how they tackled it in a good way. Here is the complete description of it.
      • The vulnerability which we are going to talk today is one of the most critical ones and for one of the largest companies "Adobe" . This vulnerability left lakhs of the user under danger of getting breached.
      • The name of the vulnerability is "Flash Player Vulnerability" with an identification code "CVE-2018-5002". This vulnerability has been affecting densely in the Middle East region and was brought into vision in June 2018.
      • What actually was the securtiy flaw here? The security flaw was one of the stack-based buffer overflow bug that was been able to execute arbitaty code.
      • The following vulberability was allowing the attackers to maliciously craft the Flash object which would help them in executing codes in the victim machine and then execute the range of payloads & actions.
      • How did this vulnerability actually works?

        • The vulnerability was allowing the attacker to provide a word file to download and once executed in the victim PC the adobe flash exploits would start running.
        • This file once executed starts executing the shellcode which will then enable the attacker to command and control the servers from which the attacker would gain complete access to the victim machine.
          • Patch For Vulnerability:

            • The company has declared the patch for the vulnerability and can be patched automatically by installing the updated Flash Player as this was a critical zero-day attack.
            • The patch is available only for the users from East Asia as the vulnerability was highly active in that region.
            • Hence, this was all on technology security and how to maintain the security levels in order to stay updated and up to the mark.

Hence, this is how Adobe tackles with cybersecurity problems and there are many more things working internally in the organization.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beginning C# 5.0 Databases

Authors: Vidya Vrat Agarwal

2nd Edition

1430242604, 978-1430242604

More Books

Students also viewed these Databases questions

Question

=+ (c) Show that P[F(X) Answered: 1 week ago

Answered: 1 week ago

Question

Eco-trans case study water fall method of collecting requirement

Answered: 1 week ago

Question

b. Why were these values considered important?

Answered: 1 week ago