Question

Many businesses have migrated their accounting processing and storage from in-house servers to I-cloud applications and...

Many businesses have migrated their accounting processing and storage from in-house servers to I-cloud applications and storage. At the same time, increasing cyber threats, attacks, and intrusions have created the need for businesses to securely protect their data. Identify an organization that was subject to a data breach, hacking, or compromise. Describe the type of damage caused, how the issue was resolved, and what measures could prevent similar attacks in organizations.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

An organization: ABC Leather Inc.

Business: Manufacturing and selling leather garments.

Description:

Few years ago the organization faced data hacking through computer. The organization understood that there is hacking because its price quotation for foreign buyers (which is very confidential) was becoming leaked invariably. Once the hacker gets the price, the person can revise his quotation by keeping the quoted price lower and get the order – this is the real damage. The organization was in shortage of export orders and revenue income.

Resolved:

The issue was resolved once the person was caught doing hacking. He was an outsider and got the password from one of the company’s staffs. Once the staff was asked and charged, he accepted his misconduct – his duty was then and there terminated.

Measures:

It is done by applying more security in computer operation, since all data are kept there. Passwords were changed, easy accesses to important data are restricted, and all such important accesses are now under segregation of duties, meaning that there is now more than one person involved in such important accesses so that one’s corruption could be caught by other person.    

Add a comment
Know the answer?
Add Answer to:
Many businesses have migrated their accounting processing and storage from in-house servers to I-cloud applications and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • I have this case study to solve. i want to ask which type of case study...

    I have this case study to solve. i want to ask which type of case study in this like problem, evaluation or decision? if its decision then what are the criterias and all? Stardust Petroleum Sendirian Berhad: how to inculcate the pro-active safety culture? Farzana Quoquab, Nomahaza Mahadi, Taram Satiraksa Wan Abdullah and Jihad Mohammad Coming together is a beginning; keeping together is progress; working together is success. - Henry Ford The beginning Stardust was established in 2013 as a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT