Did the company handle the public response well

Assignment Help Management Information Sys
Reference no: EM131170928

Assignment 1: Appropriate Incidence Response

Identify a case study in which a company had a security incident and prepare a public response.

An example is the 2012 LinkedIn password hack, which caused the leakage of millions of users' passwords stored in a file on the internet.

Individuals who used the same password for LinkedIn as they did for other sites were scrambling to change passwords. While public relations (PR) personnel may be hoping to downplay the incident, legal teams often want disclosure of what happened to avoid being sued later on if hacked passwords are used for malicious activity.

Submission Details:

A minimum of 250 words, post to the Discussion Area your response to the following:

Identify a case where a company had to prepare a public response to a security incident.

Examine and assess what happened, what vulnerability was exploited, and how the company handled the response publicly.

In your opinion, did the company handle the public response well? Justify your responses.

Your response should rely upon at least two sources from professional literature-articles from peer-reviewed journals and relevant textbooks. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., APA format); and use accurate spelling, grammar, and punctuation.

Reference no: EM131170928

Questions Cloud

Manufacturer of digital controls for milling machines : X is a u.s. manufacturer of digital controls for milling machines. the firm has been exporting its least expensive model, which sells for us$1,500 to Mexico, where the demand has proved to be Q= 3,500 - 2P, where Q= quantity demanded and P= price. X ..
Compare and contrast porters generic strategies : Strategic management: Compare and contrast porters generic strategies (classed as red ocean) and the blue ocean model using illustrative business examples and with diagram explanation?
How does the final length of the bar compare : How does the final length of the bar compare with its originallength?
Discuss the advantages and potential risks : As firms attempt to internationalize, they may be tempted to locate their facilities where business regulation laws are lax. Discuss the advantages and potential risks of such an approach, using specific examples to support your response
Did the company handle the public response well : Identify a case where a company had to prepare a public response to a security incident. Examine and assess what happened, what vulnerability was exploited, and how the company handled the response publicly.
Increase the elastic you of demand for good : Which of the following will not tend to increase the elastic you of demand for a good ?
Do police departments in the us need military equipment : Do police departments in the United States need military equipment? Use this book as reference plus four other references https://bookshelf.vitalsource.com/#/books/9781269514415/cfi/8/6!/4/2/2@0:0
Explain the potential personal liability to acme fireworks : Analyze whether the owner formed a contract with the businesses, and apply the five essential elements of an enforceable contract. Explain the potential personal liability to Acme Fireworks if a spectator is injured by a stray firework from a firewor..
What are some issues that concern international organization : Research the following types of organizations "Nonprofit, For-profit, Political and Government and International", identify key concerns for each and provide example of each type of organization: What are some issues that concern International Organi..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the purpose of a university security policy

Explain the purpose of a university security policy and indicate the major reasons why they are necessary. Provide your opinion as to whether a university security policy is more or less important to have than a business security policy

  Accounting information systems

1. How are flowcharts used in accounting information systems? How are DFDs similar to flowcharts? How are they different?

  How security management can be applied at the company

Your CEO has asked you to prepare a report to explain whether or not a security plan is needed, and to clarify how security management can be applied at the company

  What are the risks associated with directly executing user i

3. What are the risks associated with directly executing user input ? What are the minimum steps needed to parse user input before it is allowed to be used in execution ?5. What are the risks associated with inheritance in classes ? What are generic ..

  What steps will you take to negate or minimize challenges

What are some of the other types of challenges that you foresee that might affect your relationship with the UPD? What steps will you take to negate or minimize these challenges?

  Explain the purpose and the makeup

Explain the purpose and the makeup (which type of employees) that make up each sub team

  Define the concept of control

Question about control - Define the concept of control and Identify the benefits to the company now and in the future.

  Differences between how individuals make and carry out

differences between how individuals make and carry out decisions about computers and how companies make and carry out

  Advantages of using social media for advertising

What are the advantages and disadvantages of using social media for advertising, brand building, market research, and customer service

  Other services resulting from high speed broadbandstreaming

other services resulting from high speed broadbandstreaming video over the web has replaced video stores in some areas

  You are the health information manager at a 300 bed

you are the health information manager at a 300 bed hospital curtin hospital. curtin hospital have decided to commence

  What are some guidelines for an effective security policy

What are some guidelines for an effective security policy and What are 5 pillars of IT security? Explain them

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd