StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Case Study - Assignment Example

Cite this document
Summary
Most people do not give it much thought until there is an incident then the company starts dealing with stolen customer data, disclosure of confidential financial information or worse…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Case Study Assignment
Read Text Preview

Extract of sample "Case Study"

Case Study Assignment Information security is not something that gets a lot of executive attention though it should. Mostpeople do not give it much thought until there is an incident then the company starts dealing with stolen customer data, disclosure of confidential financial information or worse. One of the most dangerous growing cyber threats is hacking for financial gain by hackers. There has been an emergence of a sophisticated criminal ecosystem that functions like any business, management structure, offshoring, and quality control (Plant 1).

This type of hacking is beyond stealing customer credit card information or passwords. Hackers might focus on a company’s financial data to obtain its earnings before being publicly released. Such knowledge might enable their profit by acquiring or dumping stock.Another threat to data security of a corporate firm is known as the advanced persistent threat. It predominantly involves stealing intellectual property and associates itself with state-sponsored espionage. The gains are not strictly financial because what is at risk is not only the intellectual property of the corporate entity but possibly the national security.

APT targets organisations and nations for economic and political motives. The Stuxnet worm case in 2010 is an example of such a case (Plant 1). The Stuxnet worm infiltrated industrial control systems like those that manage water or power plants. Industries at risk include defence industries, financial industries and technology industries.Another potentially dangerous threat is hacktivism. The goal of the hackers in this type is creating or altering the public perception of the brand. For instance, the hackers might hack and get sensitive information about the company and disclose it the whole world especially if the company belongs to the private sector.

An example of such a type of threat is WikiLeaks or the digital equivalent of Occupy Wall Street. Works CitedPlant, Robert. “Does Your CEO Really Get Data Security?” Harvard Business Review, 4 June. 2013. Web. 2 March 2015.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case Study Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Case Study Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1680811-case-study-assignment
(Case Study Assignment Example | Topics and Well Written Essays - 250 Words)
Case Study Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1680811-case-study-assignment.
“Case Study Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1680811-case-study-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Case Study Assignment

Organisational Behaviour and Its Influences on the Employees

Organisational behaviour is a learning and application process of acquaintances regarding how populace, folks and groups operate within the organization....
13 Pages (3250 words) Assignment

A Form of Revenge for Taking Life of Another Person

Capital Punishment (p.... 93) Arguably, death penalty has been a controversial issue since its first introduction as critics argue that it is a violation of human rights, that is, the right to life....
4 Pages (1000 words) Case Study

Experian PLC and Market Efficiency

It is the purpose of this study to determine whether the market reacts to new information in a predictable fashion and to a significant degree by affecting the price of a given security....
13 Pages (3250 words) Case Study

Mandarin Oriental Group case study - Assignment

On the other hand, MOHG belongs to luxury hotel and hospitality industry and it offers luxury hotel services across the world (Mandarin Oriental, 2014)....
4 Pages (1000 words) Assignment

Internal Strategic Analysis of Tesco

The food retail industry represents one of the most competitive industries of U....
16 Pages (4000 words) Case Study

Unit 5 Case Study Assignment 1

It is vital to note that Nikisha Kitchens is basically composed of a computer network that is divided into three main segments, which are, a business and sales unit, plant unit and a remote network of an outlet store....
1 Pages (250 words) Case Study

Tablet Computing: Instructional Technology Group

In fact, even the old aged who were at first reluctant and even opposed to the use of these electronic gadgets are beginning to learn and develop a liking for them....
3 Pages (750 words) Case Study

MediSys Case Study Assignment

The main focus of the paper "MediSys Case Study Assignment" is on intense situational analysis, which purposes to shed light on the prevailing situations and concerns in the medical organization, including recommendations to the company president especially on matters concerning the meeting....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us