1,954
9
Essay, 3 pages (600 words)

Hackers broaden their attacks against business

Running Head: Response Paper on Response Paper on Hackers Broaden their Attacks against Business Organizations ComputerSciences and Information Technology Instructor Name Date of Submission Response Paper on Hackers Broaden their Attacks against Business Organizations In the article titled Hackers Broaden their Attacks, the writers have described the contemporary security situation of the business world intricately. The article is informative, and it is primarily centered on some recent developments in the sphere of cyber security in USA. On 21st May, 2011, the computer networks of Lockheed Martin Corp. were attacked. According to the company, its information security team detected the attack in proper time and initiated aggressive security measures before any significant damage was actually done. Lockheed is a major information and defense technology supplier to the federal government. After a few days, the renowned broadcaster PBS also faced a serious cyber attack. In the words of Worthen et al (2011), “ Over the weekend, the website for the PBS show ” NewsHour” was altered by hackers to include a fake article claiming that rapper Tupac Shakur, who was murdered 15 years ago, was alive in New Zealand. The hackers also posted login information that stations and other entities use to access PBS sites.” In the article, the writers have further pointed out that the hackers generally used to target corporations, which stored and managed secret government information or critical financial data. Hyundai Card/ Hyundai Capital Co., Epsilon, EMC Corp., etc. had been victims of such attacks. But of late, the hackers are targeting corporate secrets, media operations, and other sorts of diverse information security implementations too. The situation is changing rapidly, and the CEOs, CIOs, and CTOs of different organizations are facing unexpected challenges in the sphere of IT security. They are really being taken aback! After reading this article, I would suggest that the organizations should not panic due to the news of increased hacking activity. It should be borne in mind that since the motives of the hackers have expanded, the organizations must also expand their security systems and cyber surveillance in reply. In advising a CEO, CTO, or CIO, I would further suggest that the security measures for preventing computer related crimes must include proper documentation of the criminal activities, especially in regards of hacking. Profiling the computer criminal (i. e., the hacker), understanding legal considerations, seizing computerized evidence, etc. are the ways to prevent this hi-tech crime (Paladin Press, 1990). It is vital to have a methodology to analyze the impact of cyber threats and subsequently make the current and future computer networks resilient. Implementation of complicated cryptography, proper maintenance of public and private key infrastructure, simulation based network security trials, and utilization of advanced firewall technologies can put up a substantial organization level multi layer defense system (Cetinkaya et al, 2010). To conclude, at the highest level of the management of a company robust understanding of the software and hardware security technologies should be developed so that both the managers and engineers can join hands to improve cyber security and help in protecting critical data. The dynamic needs of the information technology infrastructure can be considered to be a part of strategic management. Without data integrity and information security, no corporate entity can survive these days. Therefore, the focus should be put on synchronizing the management and technological needs of the company. Otherwise, the hackers will become unstoppable, and the global economy will be at stake. References C? etinkaya, E. K., Broyles, D., Dandekar, A., Srinivasan, S., Sterbenz, J. P. G. (2010). IEEE Xplore – A comprehensive framework to simulate network attacks and challenges. Retrieved June 10 2011 from http://ieeexplore. ieee. org/xpl/freeabs_all. jsp? arnumber= 5676585. Paladin Press. (1990). Computer Crimes: High-Tech Theft. Boulder: Author. Worthen, B., Adams, R., Hodge, N., and Ramstad, E. (2011). Lockheed, PBS Join Roster of Hacking Victims – WSJ. com. Retrieved June 10 2011 form http://online. wsj. com/article/SB10001424052702304563104576355623894502788. html.

Thank's for Your Vote!
Hackers broaden their attacks against business. Page 1
Hackers broaden their attacks against business. Page 2
Hackers broaden their attacks against business. Page 3
Hackers broaden their attacks against business. Page 4

This work, titled "Hackers broaden their attacks against business" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Hackers broaden their attacks against business'. 16 November.

Reference

AssignBuster. (2021, November 16). Hackers broaden their attacks against business. Retrieved from https://assignbuster.com/hackers-broaden-their-attacks-against-business/

References

AssignBuster. 2021. "Hackers broaden their attacks against business." November 16, 2021. https://assignbuster.com/hackers-broaden-their-attacks-against-business/.

1. AssignBuster. "Hackers broaden their attacks against business." November 16, 2021. https://assignbuster.com/hackers-broaden-their-attacks-against-business/.


Bibliography


AssignBuster. "Hackers broaden their attacks against business." November 16, 2021. https://assignbuster.com/hackers-broaden-their-attacks-against-business/.

Work Cited

"Hackers broaden their attacks against business." AssignBuster, 16 Nov. 2021, assignbuster.com/hackers-broaden-their-attacks-against-business/.

Get in Touch

Please, let us know if you have any ideas on improving Hackers broaden their attacks against business, or our service. We will be happy to hear what you think: [email protected]