Cyber security involves a set of technology, procedures and activities designed to defend against threats, disruption or unwanted exposure to networks , computers, programmes, and records. Data breaches arise from a cyber attack that allows cyber criminals to access a computer system or network unauthorized and to steal the customers or users' privately-owned, sensitive or confidential personal and financial data (Kumar et al., 2018). Cybersecurity Threats involves Viruses program. Probably the most commonly recognized danger to computer protection, a computer virus is a software that affects the function of a device without the user's permission or understanding it also involves threats of Spyware, predators and phishing. The issue of information protection involves the usage of GDPR, IoT-compromised threats, the challenges of cloud health, machine learning and AI threats and assaults on cryptocurrency and Blockchain networks (Kumar et al., 2018). A cyber threat is a malicious act that attempts to damage information, steal data, or generally disrupt digital life. Computer viruses, data violations, denial of service attacks and other attack vectors include cyber threats. In this report three case studies of cyber security will be discusseed. Firstly, description of case company in each case will be evaluated. Secondly, cyber security issues covered in each case will be analysed. Lastly, lessons learnt from each case will be evaluated.
General information of the company
T-Mobile is typically a US wireless network operator, its main shareholder being Deutsche Telekom (Dt) with a 43% share, with SoftBank Group, a Japanese joint stock company, partly owning the company and with a 24% share. The rest of the 33% share is publicly owned via common stock. His registered office is in the metropolitan area of Seattle, Bellevue, Washington. In the United States, Puerto Rico and the US, T-Mobile US offers wireless voice and data services.
Google+ was a network of social networking operated and managed by Google (often called G+), and occasionally as Google Plus. On 28 June 2011, the network started against other social media links such as Google Drive, YouTube and Blogger. The network was launched. The service, Google's fourth social media foray, grew significantly in its initial years, while statistics on use varied depending on how the service was defined. The company was managed by three Google executives and underwent major improvements prior to a redesign in November 2015.
Technologies, Inc. is an American company offering utilities such as peer-to - peer ridesharing and hailing, nutritional supply (Uber Eats) and a combined network comprising bikes and bickets. Technologies, Inc. The company is based in San Francisco in over 785 municipalities worldwide. They have links to their websites and mobile apps.Uber is a public service company that is under the jurisdiction of the California Public Services Commission (Huang et al., 2017). The Commission regulates Public Utilities, including through the charging of transportation services provided by Uber 's partner drivers, within its competence. The Commission regulates public utilities.
Key Business Processes of The Company
Key cyber security issues identified
b) Risks associated with the issues
c) Impacts of the issues on case company
Actions reported in each case to address the identified issues
b) Outcomes of the reported actions
c) Proposed actions other than the reported ones that could be taken to address the issues
d) Suggestions for preventing the issues in future
It is concluded that High-profile data violations remind all of us of the high priority for enterprises in data security. Organizations are now facing a data violation one in four chance of costing about $2.21 M in the next two years. The consequence of an infringement includes lower customer loyalty, lack of confidence, a possible loss in income and a negative reputation. In defence of computers, servers , mobile devices, electric systems , networks and malicious assault data, cyber security is a practice. It is also known as the protection of IT or electronic details. This concept can be divided into many growing groups, from enterprise to mobile computing. The global security challenge is growing at a high rate and each year there are more and more data breaches. A RiskBased Security report revealed that in the first nine months of 2019 alone a shocking 7.9 billion record was exposed to data infringements.
The amount of documents released in the same timeframe in 2018 is more than twice as high (112%). Given the hot air surrounding cyber security, tech giants Google and Facebook should come with no surprise if the security of your business and the privacy of your customers are paired at any cost. It is the responsibility of every organization to determine whether this cost is paid before or after an infringement, which always constitutes a greater loss for all the parties concerned. T-Mobile has announced "unauthorized data capture”. The gpu later confirmed the rumor of encrypted passwords being attacked as well. The European GDPR has to create "road rules" for companies and public bodies that use personal data in countries where this law applies. The DPO is to support our company in living up to our GDPR obligations and to monitor compliance with these obligations. Google's controls over product safety must be regularly audited against international standards such as ISO standards and SSAE18 / ISAE 3402 in order to be aware that its company data are processed responsibly. ISO 27001, one the globally accepted statutory health criteria, will be implemented.
Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour?. arXiv preprint arXiv:1901.02672.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. Computers & security, 56, 1-27.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., & Smeraldi, F. (2016). Decision support approaches for cyber security investment. Decision support systems, 86, 13-23.
Gaglione Jr, G. S. (2019). The Equifax Data Breach: An Opportunity to Improve Consumer Protection and Cybersecurity Efforts in America. Buff. L. Rev., 67, 1133.
Gharaibeh, A., Salahuddin, M. A., Hussini, S. J., Khreishah, A., Khalil, I., Guizani, M., & Al-Fuqaha, A. (2017). Smart cities: A survey on data management, security, and enabling technologies. IEEE Communications Surveys & Tutorials, 19(4), 2456-2501.
Huang, Z., Liu, S., Mao, X., Chen, K., & Li, J. (2017). Insight of the protection for data security under selective opening attacks. Information Sciences, 412, 223-241.
Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691-697.
Mendel, J. (2017). Smart grid cyber security challenges: Overview and classification. e-mentor, 68(1), 55-66.
Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST Special Publication, 800, 181.
Robbins, J. M., & Sechooler, A. M. (2018). Once more unto the breach: What the equifax and uber data breaches reveal about the intersection of information security and the enforecement of securities laws. Criminal Justice, 33(1), 4-7.
Rafferty, W., Rafferty, L., & Hung, P. C. (2016). Introduction to big data. In Big Data Applications and Use Cases (pp. 1-15). Springer, Cham.
Rojas, J. S., Rendón, Á., & Corrales, J. C. (2019). Consumption Behavior Analysis of Over the Top Services: Incremental Learning or Traditional Methods?. IEEE Access, 7, 136581-136591.
Whitler, K. A., & Farris, P. W. (2017). The impact of cyber attacks on brand image: Why proactive marketing expertise is needed for managing data breaches. Journal of Advertising Research, 57(1), 3-9.
Zhang, Y., Chen, X., Li, J., Wong, D. S., Li, H., & You, I. (2017). Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379, 42-61.
Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Computer Science Assignment Help
5 Stars to their Experts for my Assignment Assistance.
There experts have good understanding and knowledge of university guidelines. So, its better if you take their Assistance rather than doing the assignments on your own.
What you will benefit from their service -
I saved my Time (which I utilized for my exam studies) & Money, and my grades were HD (better than my last assignments done by me)
What you will lose using this service -
Unfortunately, i had only 36 hours to complete my assignment when I realized that it's better to focus on exams and pass this to some experts, and then I came across this website.
Kudos Guys!Jacob "
Proofreading and Editing$9.00Per Page
Consultation with Expert$35.00Per Hour
Live Session 1-on-1$40.00Per 30 min.
Doing your Assignment with our resources is simple, take Expert assistance to ensure HD Grades. Here you Go....