Need help with your Assignment?

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

Security Breach

Security Breach

Describe one issue not mentioned in the textbook when using contracted security at an organization. Then, describe one issue not mentioned in the textbook when using proprietary security at an organization.

Do you need a fresh and original copy of “Security Breach”? Place your order now.

Yahoo is a company that experienced one of the most significant security breaches ever seen around the globe. Once a dominant company within the search engine sector, the company became a victim of cyber crimes. A total of 3 billion user accounts were hacked. Today, they are supposed to pay a total of $50 million to the victims (Jones, 2018). The account compromised its users’ real names and private details, creating a bad reputation for the company (Jones, 2018). The issue could have been avoided if the company had taken regular security updates on its system to detect any form of cyber-attacks. The regular updates do not need any extra funds as the IT and search optimization teams only have to upgrade and improve the current systems ideally. The fact that the company used an internal agency makes the task easier based on easy coordination.

Similar Post: MBA Reflection

Reference

Jones, R. (2018)Yahoo to Pay $50 Million to Victims of Massive Security Breach.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Security Breach

Please respond to the following:

Security Breach

Security Breach

  • From the e-Activity, determine whether the breach could have been avoided without additional funds or technology. Explain why or why not.
  • Describe one issue not mentioned in the textbook when using contracted security at an organization. Then, describe one issue not mentioned in the textbook when using proprietary security at an organization.
  • e-Activity-Research the Internet for an article that describes an organization whose perimeter security failed. Assess the damages and outcome of the situation and those responsible for the security breach. Also take note if the organization was using an internal or external agency. Be prepared to discuss.

Order Solution Now