Demonstrates mastery conceptualizing the problem

Assignment Help HR Management
Reference no: EM131440122 , Length: 6

Virtual Teams And Protecting Information Assets

Starting in the spring of 2014, eBay was subjected to a series of security intrusions into its database of user passwords. The breach occurred when hackers compromised some employee login credentials, giving them access to the eBay system. It took over two months for eBay to know it had been compromised.

The eBay hack came on the heels of the massive Target hack. Target's security center was warned of the invasion but did nothing. At Neiman Marcus, alarms were set off as credit card data was being stolen. Sony with its enormously large and successful Cloud-based gaming system, the PlayStation network, also was attacked. Intrusions resulted in compromising financial data, including credit card numbers, for literally millions of participants.

Moreover, this was not a single giant assault, but a series of recurring attacks (apparently conducted by a collective) that Sony's security experts seem to have been unable to stem. The result has been huge financial losses for the company and, potentially more seriously, damage to its reputation that it may never be able to repair.

You can read about these hacks in the following articles.

Mac, Ryan (2014). California joins other states in investigation of EBay hack.

https://www.forbes.com/sites/ryanmac/2014/05/23/as-ebay-notifies-users-of-hack- states-launch-investigation/

Riley M., Elgin, B., Lawrence, D., and Matlack. C. (2014). Missed alarms and 40 million stolen credit card numbers: How Target blew it. March 13, 2014.

https://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic- hack-of-credit-card-data

Elgin, B., Lawrence, D., and Riley, M. (2014). Neiman Marcus hackers set of 60,000 alerts while bagging credit card data, Feb 21, 2014.

https://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers- set-off-60-000-alerts-while-bagging-credit-card-data

Mills, E. (2011) Attacks on Sony, others show it's open hacking season. CNET News. Retrieved June 13, 2011, from

https://news.cnet.com/8301-27080_3-20069995-245/attacks-on-sony-others-show-its-open-hacking- season/#ixzz1PHwIH7dt

Mills, E. (2011) Who is behind the hacks? (FAQ). CNET News. Retrieved June 14, 2011, from

https://news.cnet.com/8301-27080_3-20071100-245/who-is-behind- the-hacks-faq/?tag=rtcol;inTheNewsNow

Undoubtedly, you will wish to do some further research on this situation. A good place to begin would be googling a search term such as "Sony security problems" or some variant on that theme, and then following leads as they seem interesting to you.

Now you should consider some of the things that the security experts say about such challenges. Here are two useful articles that discuss information security in the context of Cloud-based systems, and how to respond to incidents:

Rudman, R.J. (2010). Incremental Risks in Web 2.0 Applications. The Electronic Library, 28(2), 210-230. [ProQuest]

Lanois, Paul. (2011). Privacy in the age of the cloud. Journal of Internet Law. 15(6), 3-17. [ProQuest]

In addition, the optional readings expand on many of the central points; you may also want to do some independent research of your own to clarify any issues that concern you.

As we noted before, if you don't really pay attention to this material, it's really unlikely that you can write an acceptable paper on the topic below, let alone an exceptional one. We spend quite a lot of time trying to identify useful sources for you that bear on our topics for analysis; while we strongly encourage you to conduct your own further research and identify additional useful sources, this should be an add-on to the basic material rather than a substitute for it.

SLP Assignment

When you have read through the articles and related material and believe that you have a reasonable understanding of the hacking situations, compose a 4- to 6-page critical analysis paper, on the topic:

The best alternative(s) available to these firms who have been hacked and how to resolve their security crisis

Clearly, there are multiple possible answers that you probably will find during your research on this issue; there's no one necessarily best answer, although it is pretty clear that good solutions will have to be both social and technical (i.e., sociotechnical) in nature.

Your paper will be assessed primarily on how well you are able to support your viewpoint with the literature and the evidence. Obviously, as noted below, this will obligate you to actually be able to present such evidence in an academically respectable manner.

SLP Assignment Expectations

Length: Follow the number of pages required in the assignment excluding cover page and references. Each page should have about 300 words.

Assignment-driven criteria : Demonstrates clear understanding of the subject and addresses all key elements of the assignment.

Critical thinking : Demonstrates mastery conceptualizing the problem. Shows analysis, synthesis, and evaluation of required material. Conclusions are logically presented.

Scholarly writing : Demonstrates proficiency in written communication at the academic level of the course.

Assignment Organization : Assignment is well organized and follows the required structure and organization of the assignment.

Citing and using references : Uses relevant and credible sources to support assertions; uses in-text citations; properly formats references.

Reference no: EM131440122

Questions Cloud

Develop a linear optimization model to maximize profit : Jaycee's department store chain is planning to open a new store. It needs to decide how to allocate the 100,000 square feet of available floor space among seven departments.
Explain types of inferential statistics that might be best : Analyze the types of inferential statistics that might be best for analyzing the data, if you were to collect a sample. Analyze the role probability or trend analysis might play in helping address the business problem.
Contracting parties are supposed to anticipate the risk : A previous edition of our text stated that "contracting parties are supposed to anticipate the risk that costs may fluctuate." Should parties be given more flexibility to demand a higher price if costs go up? In what situations? Explain why/why no..
Reviewing an employee attendance report : A hospital administrator is reviewing an employee attendance report. It appears that 92% of the healthcare workers receive the influenza vaccination. Which problem is presented by the data?
Demonstrates mastery conceptualizing the problem : Starting in the spring of 2014, eBay was subjected to a series of security intrusions into its database of user passwords. The breach occurred when hackers compromised some employee login credentials, giving them access to the eBay system. It took..
Governmental regulation of financial entities : There has been widespread debate over governmental regulation of financial entities. This week, we will discuss the various laws, and the ethical considerations of those regulations
What approaches could have yielded additional information : How did participating in discussions help your understanding of the subject matter? Is anything still unclear that could be clarified? What approaches could have yielded additional valuable information?
Get better understanding of our company : This application will allow them to schedule their services, make adjustments, review any notes from the servicer, even open their residence or car, and review security cameras if they opt for the full technology package.
Organizational strengths represent competitive advantages : Many employers have a performance management system that includes performance appraisals, which would typically include: Organizational strengths represent competitive advantages when they

Reviews

Write a Review

HR Management Questions & Answers

  Define and explain the differences between vision and

define and discuss the differences between vision and mission statements.your response should be at least 200 words in

  Leading a session of a psycho-educational group

You are a volunteer at a counseling center, and your mentor has asked you to assist in leading a session of a psycho-educational group on a disorder of your choice.

  Grievance and arbitration procedures

Grievance and arbitration procedures usually serve the needs of labor alone. Agree - people are of the opinion that grievance and arbitration procedures usually serve the needs of labor alone.

  White privilege

What does the author mean by the concept of "white privilege"?Re-read the author's list of 46 examples of white privilege. Select the five examples that seem the most significant in helping you to understand that white people are privileged. Explain ..

  Executive compensation reverse discriminationamp

executive compensation reverse discriminationamp legislationexplain the major components of an executive compensation

  Management training guide - delegationyour management team

management training guide - delegationyour management team has been retained by a senior manager who is concerned about

  What should occur if the company rejects a candidate

Choosing the best candidate for an organization can require a great amount of time and effort for the human resources department. Often times, HR looks at both internal and external candidates. Discuss the firm's external and internal assessment g..

  Describe a real-world situation involving ethics

Describe a real-world situation involving ethics that relates to or could be addressed utilizing primary concepts from the assigned readings. Explain how the primary concepts could address the situation.

  Employee motivation for hr effectiveness improvement plan

Question 1: Conduct a literature review in employee motivation for an effective HR improvement plan. Question 2: Analyze current HRM models of service, process, and systems enhancements as it relates to employee motivation and problem or opportunit..

  What health issue is relevant to maizie predicament

Jean, a geologic specialist, agreed to accept an overseas assignment for her company after the company agreed to store her yacht, provide security service 24X7, and arrange for Mimi, her cat, to go with her. What kind of pay factor was used?

  Workplace and sexual harassmentneed some assistance in

workplace and sexual harassmentneed some assistance in answering the following questions in regards to a mini case

  Case study-indigo books and music

Prior to 2001 there were two big-box bookstore chains in Canada - Chapters and Indigo. Indigo was formed in 1996 by Heather Reisman who left her job as president of Cott Corporation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd