What kind of information was compromised


Discussion Post

i) Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

ii) Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more). In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

The response should include a reference list. One-inch margins, Using Times New Roman 12 pnt font, double-space and APA style of writing and citations.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: What kind of information was compromised
Reference No:- TGS03030352

Now Priced at $20 (50% Discount)

Recommended (90%)

Rated (4.3/5)