Identify the vulnerability-ensure customers are protected


Assignment:

Please describe a case that has been in the news recently and describe what harm can be done by the unlawful intrusion into the computer of another. Minimum 500 words.

Cybercrime can occur in different ways and IT users are expected to get updated on different cybersecurity risks, threats, and vulnerabilities. Hacking activities is one of the cybercrime that is well-recognized and most IT users have been experiencing different challenges in detecting and mitigating hacking activities (Marcum & Higgins, 2019). Hacking is an unauthorized approach used to access the IT user website and steal useful information by causing data breaches.

Case

The hackers have been targeting Card Systems Inc. to steal useful information such as one that was reported in June 2005 concerning the hacking of credit cards. The companies have been connecting with the clients to make payments through the use of credit card transactions and this has led to the hacker's attempt in accessing the credit card information and steal user information (Holt, 2018). The creation of the MasterCard is a global credit card and the hackers have been identified breaching the security of the banks to steal money from their clients without any detection. JP Morgan was recommended to identify the vulnerability and ensure the customers are protected against such incidents that interfere with the company's good reputation.

Impact

The information that was collected as news stories was based on the plethora and the company had been experiencing hacking threats that interfere with their database. The company realized the hacking activities after there was a failure in the system as mentioned by JP Morgan Chase. The company had to close down every debit card registered under their accounts to avoid further breaching (Fahlevi et al., 2019). The company was recommended to update the security layers that will help in detecting intruders such as installing a firewall and encrypting the organization network system to prevent hacking activities from the intruders. There will be challenges during the investigation since the IT security expert could not trace the hackers and this interferes with the stock market performance.

References

Fahlevi, M., Saparudin, M., Maemunah, S., Irma, D., &Ekhsan, M. (2019). Cybercrime Business Digital in Indonesia. In E3S Web of Conferences (Vol. 125, p. 21001). EDP Sciences.

Holt, T. J. (2018). Regulating cybercrime through law enforcement and industry mechanisms. The ANNALS of the American Academy of Political and Social Science, 679(1), 140-157.

Marcum, C. D., & Higgins, G. E. (2019). Cybercrime. In Handbook on Crime and Deviance (pp. 459-475). Springer, Cham.

Solution Preview :

Prepared by a verified Expert
Database Management System: Identify the vulnerability-ensure customers are protected
Reference No:- TGS03151877

Now Priced at $25 (50% Discount)

Recommended (95%)

Rated (4.7/5)