Alternatives of Hacking
Alternatives of Hacking
Paper details When you have read through the articles and related material and have a reasonable understanding of the hacking situations, compose a critical analysis paper, on the topic: The best alternative(s) available to these firms who have been hacked and how to resolve their security crisis? Mac, Ryan (2014). California joins other states in investigation of EBay hack. http://www.forbes.com/sites/ryanmac/2014/05/23/as-ebay-notifies-users-of-hack-states-launch-investigation/ Riley M., Elgin, B., Lawrence, D., and Matlack. C. (2014). Missed alarms and 40 million stolen credit card numbers: How Target blew it. March 13, 2014. http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data Elgin, B., Lawrence, D., and Riley, M. (2014). Neiman Marcus hackers set of 60,000 alerts while bagging credit card data, Feb 21, 2014. http://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-data Mills, E. (2011) Attacks on Sony, others show it’s open hacking season. CNET News. Retrieved June 13, 2011, from http://news.cnet.com/8301-27080_3-20069995-245/attacks-on-sony-others-show-its-open-hacking-season/#ixzz1PHwIH7dt Mills, E. (2011) Who is behind the hacks? (FAQ). CNET News. Retrieved June 14, 2011, from http://news.cnet.com/8301-27080_3-20071100-245/who-is-behind-the-hacks-faq/?tag=rtcol;inTheNewsNow Undoubtedly, you will wish to do some further research on this situation. A good place to begin would be googling a search term such as “Sony security problems” or some variant on that theme, and then following leads as they seem interesting to you. Now you should consider some of the things that the security experts say about such challenges. Here are two useful articles that discuss information security in the context of Cloud-based systems, and how to respond to incidents: Rudman, R.J. (2010). Incremental Risks in Web 2.0 Applications. The Electronic Library, 28(2), 210-230. [ProQuest] Lanois, Paul. (2011). Privacy in the age of the cloud. Journal of Internet Law. 15(6), 3-17. [ProQuest]
Leave a Reply
Want to join the discussion?Feel free to contribute!