441 Search Results for cyber security

Facebook Data Breach Essay

In this Facebook data breach essay, we discuss how Facebook allowed applications to mine user data.  The essay will explain what data was breached, how it was breached, and how that data was used.  Furthermore, the essay will also discuss t Continue Reading...

Information Security Term Paper

Security An institution of higher learning is one of the most vulnerable places to cyber-attacks available to hackers due to the number of units operating, lackadaisical security measures and the ability of hackers to hide in plain sight. The fact Continue Reading...

Cyber Terrorism Research Paper

Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the Continue Reading...

Automation Logistics Management Essay

Technology That Will Change LogisticsIntroductionLogistics and supply chain management have always been a challenging area for companies, military organizations, and governments. With globalization and the increased complexity of supply chain network Continue Reading...

Cloud Security Key Elements Term Paper

Cloud SecurityIntroductionCloud security refers to the integrated technologies and procedures to respond to potential internal and external business threats. Its primary goal is to protect cloud computing infrastructure. It forms an essential element Continue Reading...

Acquisition Solutions Research Paper

Description of the ProblemThe problem is the inefficiency, complex, and time consuming nature of paper medical records that are used to document patient information. The Patient Admission Department obtains personal information from patients, which i Continue Reading...

New Era Nuclear Security Research Paper

Nuclear security is one of the most important issues of modern times, as the 2016 nuclear security summit in Washington showed (Malin & Roth, 2016). As Malin and Roth (2016) note, the international community has embarked on a possibly dangerous p Continue Reading...

Mitigating Data Risk at AMEX Research Paper

American Express and Data Theft Risk Scenario In March 2016, American Express admitted that customer data was stolen from the company in 2013 in a letter to the California Attorney General (Condliffe, 2016). As a credit card company, AMEX works wit Continue Reading...

Banking Crimes from Hackers Essay

Cyber Attacks on Financial Institutions Carmalia Davis The finance industry has continued to receive more targeted and sophisticated cyber attacks from criminals. These criminals often email phishing campaigns to customers which have remained the Continue Reading...

Critical Updates for IT Systems

Compliance Patch Level The author of this report has been tasked with discussing the overall subject of patch compliance level. Indeed, the pros and cons of using the patch compliance level framework will be assessed. There will also be an assessmen Continue Reading...

Law and WikiLeaks Research Paper

Wiki Leaks The whistle-blowing WikiLeaks is an online organization situated in Sweden; this organization distributed records termed "the diplomatic cables" from U.S. foreign negotiators on November 28, 2010. Upon their distribution, lawmakers from a Continue Reading...

Information Technology Essay

Introduction Title: Introduction to Information Technology Information Technology (IT) is a vast and rapidly evolving field that encompasses the use of computers and telecommunications to store, retrieve, transmit, and manipulate data. From s Continue Reading...

Applied Game Theory Essay

The Versatility of Applied Game Theory Applied game theory is an intricate subject that touches upon the strategic interactions amongst rational decision-makers. It has evolved as a powerful tool not just within economics, but across a diverse ran Continue Reading...

Hacking Iranian Israeli Infrastructure Essay

Hacktavist AttacksHacktivist Attacks Show Ease of Hacking Industrial Control Systemshttps://www.securityweek.com/hacktivist-attacks-show-ease-hacking-industrial-control-systemsAn ongoing problem since 2016 and reported especially 2020 and September 2 Continue Reading...

Insider Threat Vishing Essay

To:From:Date: 4/20/2022RE: Insider Threat VishingBLUF (Bottom Line Up Front)A vishing attack is a major insider threat that could result in losses of billions of dollars for an organization because of unauthorized access to corporate systems. Multi- Continue Reading...

What is Critical Infrastructure Essay

Infrastructure is effectively what makes a nation run. It encompasses the people, places, and things necessary to deliver critical services and goods. The US Department of Homeland Security often abbreviates critical infrastructure as CIKR (Critical Continue Reading...

How the Internet Has Changed Society Essay

Abstract In the span of just twenty years, the Internet has radically transformed society. The Internet has changed the ways people interact with technology and with each other. The Internet has democratized information, while also revealing some in Continue Reading...

Volunteering in the Community Essay

Community Service I feel that it is important for young people to engage in community service. It is important to establish at an early age that you are part of a larger community. One of the things that happens, especially in high school, is that y Continue Reading...

Online Data Security Term Paper

Cloud computing presents and represents a large amount of opportunity to expand and improve the manner in which information systems, computing and usage of internet technology is managed. However, as recent hacks and exploits have pointed out, cloud Continue Reading...