Essay Available:
You are here: Home → Term Paper → Technology
Pages:
1 page/≈275 words
Sources:
2 Sources
Level:
APA
Subject:
Technology
Type:
Term Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 6.48
Topic:
Information Technology Breach (Term Paper Sample)
Instructions:
Information technology breach
source..Content:
Response Teams
Student’s Name
Professor’s Name
Institution
Course
Date
Response Teams
Information Technology within an organisation is very critical for the overall running and success of the company. The IT controls need to be monitored to ensure no security breach of data and information from the system. The breach of the security controls will lead to leakage of very vital information from the company to the public or unauthorised persons.
The main case study to be discussed will be based on the hacking of Amazon-Twitch. The result was like a result of the less secure passwords. The attacked was announced on the company’s blog and emails were sent to all the esteemed users of the system. Then a team was formed to carry out investigation and come up with a solution on how to extend and increase the security all over the board.
The team ultimately after an intensive research, said that all the passwords were to be reset due to detection of unauthorised access to the Twitch user information of the accounts. The team also concluded that email that will be sent to users will have cryptographic protections on the passwords. Based on this the conclusion was substantial to control the security breach but on addition the cryptographic protections on the passwords should be tested for their strength. The process will enable the company to be able to detect faults where the breach of the system may occur (Cavusoglu & University o...
Student’s Name
Professor’s Name
Institution
Course
Date
Response Teams
Information Technology within an organisation is very critical for the overall running and success of the company. The IT controls need to be monitored to ensure no security breach of data and information from the system. The breach of the security controls will lead to leakage of very vital information from the company to the public or unauthorised persons.
The main case study to be discussed will be based on the hacking of Amazon-Twitch. The result was like a result of the less secure passwords. The attacked was announced on the company’s blog and emails were sent to all the esteemed users of the system. Then a team was formed to carry out investigation and come up with a solution on how to extend and increase the security all over the board.
The team ultimately after an intensive research, said that all the passwords were to be reset due to detection of unauthorised access to the Twitch user information of the accounts. The team also concluded that email that will be sent to users will have cryptographic protections on the passwords. Based on this the conclusion was substantial to control the security breach but on addition the cryptographic protections on the passwords should be tested for their strength. The process will enable the company to be able to detect faults where the breach of the system may occur (Cavusoglu & University o...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Importance of Information Systems and Information Security in Work EnvironmentDescription: The managers of given companies have incorporated the systems in all operational systems to enhance the quality of work within the firms...4 pages/≈1100 words| 2 Sources | APA | Technology | Term Paper |
- Cloud Virtualization and Data Security ProtectionDescription: Disaster recovery (DR) planning is an important activity that every company should undertake to protect itself against the risks associated with loss of data/information in the face of a disaster...12 pages/≈3300 words| 12 Sources | APA | Technology | Term Paper |
- Nanotechnology on Radiation OncologyDescription: Research and provide details of nanotechnology for radiation oncology under which it will cover different applications of the technology in the study of neoplasm and management of patients...8 pages/≈2200 words| No Sources | APA | Technology | Term Paper |