Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses...

1 answer below »

In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.

For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked.

Write a five to seven (5-7) page paper in which you:

  1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
  2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.
  3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
  4. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Answered Same Day Dec 23, 2021

Solution

David answered on Dec 23 2021
120 Votes
Business systems that have been hacked

Business systems that have
een hacked






Student’s name:

Professor’s name:

Course title:


[Pick the date]


Business systems that have been hacked

Introduction
The concept of technological environment is considered to be the most dramatic force in
today‟s time, which has been shaping our destinies in a continuous fashion. Technology has
eleased wonders in all the fields possible and has greatly been affecting mankind, whether be it
obotics, medical science, miniature electronics or businesses engaged in the online market.
Almost all the organizations today are connected to the masses through websites which can be
availed at cheap costs, and in a lot of cases, even free of expenditure. The credit for this situation
can be attributed to the technological advancements made in the field of internet and online
usiness.
It is said that there were less than 15,000 domains back in the early 1990s, contrasting the
huge figures of 192 million registered domains back in December 2009. Such statistics are proof
enough of the fact, how more and more organizations have an individual and distinct entity in the
virtual world of e-commerce. This has made the buyer-seller interaction easier and pretty
effective. The critics do not hesitate to say that in the coming days, the virtual market might
surpass the actual market.
In the recent past few months of this year, a number of tech companies have been hacked
into, a few of them being Face book, Apple, Burger King, the New York Times and NBC. It is
elieved by some that the responsible parties for such cyber attack has been the Chinese
Government, although no concrete proof has been dug out to support the same. The statistics by
Symantec, the company behind the creation of Norton Anti-virus state that almost 40% of the
cyber attacks committed in the year 2012 were aimed at business organizations with staff
Business systems that have been hacked

strength of not more than 300. Almost all the companies having a domain on the internet are
prone to cyber attacks, given the tools and medium of hacking being cheap and effective.
Body
Nissan Motor Company or Nissan we know in short was hacked into by professional
hackers on the 13
th
of April, 2012. The company announced to its customers about the hacking
into the security two weeks after it took place, and stated that the hackers were after the
intellectual property of the motor giant‟s electric driven drive train system. Nissan‟s computer
systems were compromised and the information system was hacked into, although there are no
concrete evidence if the intellectual property was the target of the hackers. It is also believed, on
the other hand, that the cyber criminals got into the online network of the company and stole
employees‟ usernames and their encrypted passwords. It was added by the then Executive Vice
President, Mr. Andy Palmer, that, “however, we believe that user IDs and hashed passwords
were transmitted. We have no indication that any personal information and emails have been
compromised.”
The Japanese giant stated that some abnormalities were noticed by the IT official, the
presence of a chunk of malicious malware which had solely targeted the employees‟ log-in
details and was in the process of transmitting the same back to an outside server. Nissan reverted
ack to the queries of its customers and shareholders by stating that it had taken effective
measures to counter-attack the hack by securing its system. It also alerted its customer-base,
employees and shareholders regarding the unfortunate illegal cyber-attack. It is to be noted that
the company took 10 days to respond about the hack, which was questioned by a lot of people.
Business systems that have been hacked

According to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here