Question

Find AN EXAMPLE of an organization that faced an information systems security issue or crisis. 1)...

Find AN EXAMPLE of an organization that faced an information systems security issue or crisis.

1) How did the organization identify that there was a security problem?

2) What, if any, security infrastructure and policies were in place when the problem occurred?

3) What initial actions were taken to deal with the situation?

4) From a management perspective, what, if any, new organizational policies and procedures did they institute?

5) Were any new security tools and technologies eventually implemented to further safeguard their systems?

6) What was the business impact? How did they recover? Were there any legal ramifications, loss of customers, or damage of reputation?

7) Generally speaking, how can a business determine the value of investing in security and control?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

An enormous data breach targeting grownup dating and entertainment company Friend Finder Network has exposed more than 412 million accounts.The crack includes 339 million balances from AdultFriendFinder.com, it also includes over 15 mil "deleted" accounts that was not purged from the directories.


The attack happened at around the same time as one security researcher, known as Revolver, disclosed a local file inclusion flaw on the AdultFriendFinder site, which if successfully exploited could allow an attacker to remotely run malicious code on the web server.

Within the last several weeks, FriendFinder provides received several reports relating to potential security vulnerabilities coming from a variety of options. Immediately after learning this info, we took several methods to review the circumstance and bring in the proper external partners to help our investigation, " mentioned Diana Ballou, vice leader and senior counsel, inside an email on Comes to an end.

It may be believed the incident took place prior to October 20, 2016, as timestamps on some records indicate a final login of October 18. This timeline is also somewhat confirmed by how a FriendFinder Networks episode enjoyed out.

FriendFinder Networks did not verify or deny the infringement when reached by The particular Washington Post. But the company said in a statement that it experienced “received a number of reports regarding potential security vulnerabilities from the variety of sources” which it is investigating. "Immediately on learning this information, we-took several steps to review the problem and bring in the right external partners to support our investigation, inch the statement said.

All this can be attributed to improper management as well as organzationional deficiency to understand the biggest factors to third success and what threatens their position the most. Management should have been on top of security since the entire working of the company depends upon anonymity. Data breach at such a level allows us to understand that the fact that information security policies and practices are necessary for any organization to survive in today's day and age especially when their working policies depend upon the same.

Add a comment
Know the answer?
Add Answer to:
Find AN EXAMPLE of an organization that faced an information systems security issue or crisis. 1)...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • By doing a search of the Internet or by other research methods, find an example of...

    By doing a search of the Internet or by other research methods, find an example of an organization that faced an information systems security issue or crisis. 1) How did the organization identify that there was a security problem? 2) What, if any, security infrastructure and policies were in place when the problem occurred? 3) What initial actions were taken to deal with the situation? 4) From a management perspective, what, if any, new organizational policies and procedures did they...

  • There are many examples of how computer systems are vulnerable due to failure, destruction, errors, and...

    There are many examples of how computer systems are vulnerable due to failure, destruction, errors, and abuse. By doing a search of the Internet or by other research methods, find an example of an organization that faced an information systems security issue or crisis. Ponder these questions: (these questions serve as a guide; try to answer as many as you can & remember to post references) 1) How did the organization identify that there was a security problem? 2) What,...

  • Managing Global Systems topic highlights the many challenges faced by enterprises as they attempt to manage their globally dispersed information systems. The growth of international trade has ushered...

    Managing Global Systems topic highlights the many challenges faced by enterprises as they attempt to manage their globally dispersed information systems. The growth of international trade has ushered in many new business models for corporations seeking to compete in these markets. For instance, a Volkswagen car that is built in Germany may have an engine assembled in Hungary and a transmission assembled in Japan. We are entering into an age of complex business interdependencies that span across a global scale....

  • Building Information Systems & Organizational Change By doing a search of the Internet, or by other...

    Building Information Systems & Organizational Change By doing a search of the Internet, or by other research methods, find an example of an organization that introduced new technology and systems in order to effectuate changes in business processes, enhancements, and productivity gains (remember to post references). Ponder these questions (answer as many questions as you can): (1) What set of business problems was the organization trying to address? (2) What solution did the organization choose to implement? Was it developed...

  • CASE 14: BREACHING THE SECURITY OF AN INTERNET PATIENT PORTAL Major theme: IT security Background Information...

    CASE 14: BREACHING THE SECURITY OF AN INTERNET PATIENT PORTAL Major theme: IT security Background Information Kaiser Permanente is an integrated health delivery system that serves over eight million members in nine states and the District of Columbia. 1 In the late 1990s, Kaiser Permanente introduced an Internet patient portal, Kaiser Permanente Online (also known as KP Online). Members can use KP Online to request appointments, request prescription refills, obtain health care service information, seek clinical advice, and participate in...

  • If an organization is going to have a chance at a successful security program they need...

    If an organization is going to have a chance at a successful security program they need to develop policies that provide direction for all security efforts and guide the conduct of the users. These policies need to be well written to provide the organization with solid guidance to support their security objectives. Identify and briefly describe the three types of security policies. Your response should include a discussion of where each should be used. Where should policy writers look to...

  • Management Information System

    through studying the IT infrastructure of a relevant information system (IS)/ information technology (IT) used by selecting any organization of your choice locally or internationally The idea is to investigate the selected organization using the main components of IT (Hardware, software, services, data management and networking). Infrastructure Investigation, which is in a selected industry, should be carried out by using articles, websites, books and journal papers and /or interviews. In the report, you are expected to discuss:Executive Summary .     ...

  • TRUE OR FALSE QUESTIONS 1) In IS departments, the technology office investigates new information systems technologies...

    TRUE OR FALSE QUESTIONS 1) In IS departments, the technology office investigates new information systems technologies and determines how the organization can benefit from them. 2) The chief technology officer evaluates new technologies and identifies those that are most relevant to the organization. 3) In an IS department, the development group manages the computing infrastructure, including individual computers, networks, and communications media. 4) If an organization does not develop programs in-house, then the development group of the IS department will...

  • Assume you are an IT security specialist for a large U.S. online retail organization that does...

    Assume you are an IT security specialist for a large U.S. online retail organization that does business internationally. Your CIO has asked you to thoroughly review the new General Data Protection Regulation (GDPR) recently implemented in the European Union. He wants to understand exactly what the organization must do to comply with this regulation when doing business with EU customers. Provide a detailed discussion about the rules for businesses and the rights of the EU citizens. Include a discussion of...

  • Part 1: Please describe one example of information technology that you use for your role in...

    Part 1: Please describe one example of information technology that you use for your role in your organization. Your description should include the business functions that are supported by the technology, the technology infrastructure (platform) on which it operates, and the types of data that are captured or produced by the system. Next describe the benefits provided by the system. Does it automate manual processes, to reduce the labor costs required for the process? Does it support business decisions to...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT