I’m working on a cyber security multi-part question and need an explanation to help me understand better.
- As individuals or in groups assigned by your instructor, search online for recent reports on information security breaches. Come to class prepared to discuss the breach, its potential impact, and how it might have been avoided. What should the key takeaways be for managers studying your example?
- Think of firms that you’ve done business with online. Search to see if these firms have experienced security breaches in the past. What have you found out? Does this change your attitude about dealing with the firm? Why or why not?
- Why are threats to the power grid potentially so concerning? What are the implications of power-grid failure and of property damage? Who might execute these kinds of attacks? What are the implications for firms and governments planning for the possibility of cyberwarfare and cyberterror?
- Scan the trade press for examples of hacking that apply to the various motivations mentioned in this chapter. What happened to the hacker? Were they caught? What penalties do they face?
- Why do cybercriminals execute attacks across national borders? What are the implications for pursuit, prosecution, and law enforcement?
- What methods do firms use to ensure the integrity of their software, their hardware, their networks, and their partners?1.
- Describe one method of multi-factor authentication that you have experienced and discuss the pros and cons of using multi-factor authentication.


0 comments