Question
THIS QUESTION IS REGARDING COMPUTER SECURITY; Appraise common threats to and attacks against organization assets. Review the CMI Case study and provide a detailed analysis
THIS QUESTION IS REGARDING COMPUTER SECURITY;
Appraise common threats to and attacks against organization assets.
Review the CMI Case study and provide a detailed analysis of the firms security vulnerabilities, risks, and exploitations.
Real-World Case Study: Cyber Marketing Inc. (CMI) Cyber Marketing Inc. (CMI) is a marketing company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, CMI specializes in marketing products and services online for their customers. CMI employs over 600 employees and has been experiencing consistent growth keeping pace with S&P averages (approximately 8%) for nearly six years. A well-honed management strategy built on scaling operational performance through automation and technological innovation has propelled the company into the big leagues; CMI was only recently profiled in Fortune Magazine. CMI has experienced several cyber-attacks from outsiders over the past a few years. In 2012, the Oracle database server was attacked and its customer database lost its confidentiality, integrity, and availability for several days. Although the company restored the Oracle database server back online, its lost confidentiality damaged the company reputations. CMI ended up paying its customers a large sum of settlement for their loss of data confidentiality. Another security attack was carried out by a malicious virus that infected the entire network for several days. While infected the Oracle and e-mail servers had to be shut down to quarantine these servers. In the meantime, the company lost $1.700, 000 in revenue and intangible customer confidence. Theres no question that the companys CEO sees the strategic importance of technology in executing his business plan, and in this way you share a common basis of principle with him: that IT is a competitive differentiator. However, you believe that diminishing internal IT services risks security and strategic capability, whereas the CEO feels he can acquire that capability immediately at a low cost through the open market.
PLEASE MAKE COPY PASTE AVAILABLE
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started