Verified Document

Human Aspects In Cybersecurity On A Government Agency And A Private Organization Research Paper

Human Aspects in Cybersecurity on a Private Organization and a Government Agency In the contemporary digital environment where online communication and internet have become a necessity, the advancements in sophisticated modern technology have assisted both private and public organization to take the advantages of communication networking by expanding their network systems to facilitate information exchanges. Globally, more than 2 billion internet and 5 billion mobile phone users make connection daily. Moreover, people exchange over 294 billions emails, and over 5 billion messages daily. The convenience, and growing popularity of digital networks have made businesses to rely on internet networking to carry out daily tasks. Despite the benefits of internet technology both government agencies and private enterprises face increases risks by cyber attacks from different part of the world. Daily, cyber criminals continue to develop advanced and sophisticated hacking tools to steal data and other sensitive information from organizations. Typically, hackers use different tactics such as computer hacking, financial scams, email stalking and virus attacks to commit crimes. The first major cyber attacks happened in 2000 where 45 million computers globally were affected by virus. In 2010, the rates of global spam suddenly increased from 1.4% to 89.1%. In the last few years, a cyber crime global landscape has changed rapidly, criminals are using sophisticated technology as well as greater knowledge of advanced cyber security to penetrate the network systems of private and network systems of different organizations. The cyber espionage, cyber crimes and other cyber malicious activities have made several organizations to secure to a great financial loss of up to several billion of dollars. By 2010, the politically motivated cyber espionages have penetrated the business community leading to economic loss of hundred of billion dollars across different industries ranging from private business to non-governmental organizations.

The objective of this paper is to investigate the impact of cyber crime using the human factors perspectives on a small government agencies, a business...

The Target Corp (a private organization), government agency (Department of Defense) and a non-government organization (Community Health Systems)
The Target Corp

The Target Corporation is the second largest retail store in the United States apart from the Walmart, and has stores in more than 1,801 across the United States. The company retail format include discount store, hypermarket, TargetExpress, and CityTarget. The company mission statement is as flows:

"Our mission is to make Target the preferred shopping destination for our guests by delivering outstanding value, continuous innovation and an exceptional guest experience by consistently fulfilling our Expect More. Pay Less. brand promise"

"To support our mission, we are guided by our commitments to great value, the community, diversity and the environment." (Target, 2014 p 1).

Method Target Corp has been targeted

In 2014, the Target Corp announced that it had been a victim of cyber attack where hackers had stolen more than 70 million contact information, and over 40 million debit and credit cards of the Target customers. The Target announced that the stolen information include email, mailing addresses, and phone numbers of over 70 millions shoppers. Typically, the attack caused enormous damages to Target financial reputation making the stock prices to decline, which led to a resignation of the company Senior IT officer. The Target was attacked because the company refused to integrated security tools in their infrastructure despite a series of security warning from the federal government. Typically, Target Corp was vulnerable to attack because the company did not use the sophisticated security system to protect their payment system. Although, the government sent memo to the company executives that that the attackers were targeting the payment system, and despite this warning, the company ignored the warning.…

Sources used in this document:
Reference

CSIS (2014). The Economic Impact of Cybercrime and Cyber Espionage. The Center for Strategic and International Studies.

Olavsrud, T. (2014). 11 Steps Attackers Took to Crack Target. CXO Media Inc. a subsidiary of IDG Enterprise.

Riley, C & Pagliery, J. (2015). Target will pay hack victims $10 million. CNN Tech.

Smith, C. (2014). It turns out Target could have easily prevented its massive security breach. Media, LLC.
Cite this Document:
Copy Bibliography Citation

Related Documents

Human Aspects in Cyber and IT Security
Words: 2582 Length: 7 Document Type: Research Paper

Human Aspects in IT and Cybersecurity Outline Government Justification of Informing Private industry to improve or Set up Cyber-security Methods of the Government Interventions Impacts of Government Regulation on National Security Failure to comply to related cyber regulations Meeting the minimum requirements. Exceeding the Minimum Requirements The economic and national security of the United States rely on the effective functioning of the country critical infrastructures. Recently, the U.S. government has issued an executive order to manage the

Cyber Security Ethical Issues Associated With Ransomware
Words: 893 Length: 3 Document Type: Case Study

Cyber Security Ethical issues associated with ransomware It is only natural that people who are known to you will send you messages through your email address. It is lost on me how those engaging in ransomware business access information about their potential victims like the email address as to send you messages that have been infected that when opened infect the whole computer. These people engage in irregular activities. For the residents

U.S. Government the United States
Words: 3390 Length: 10 Document Type: Term Paper

This as an important moment in the history of the Cold War because it marked the start of a new series of talks between the Palestinians and the Israeli side. This moment also proved the importance of the State Secretary in relation to the issues of foreign policy and the international community. At this moment, some of the most important cabinets in the executive concern issues such as internal affairs

Presenting for the Future: Public Administration
Words: 3931 Length: 10 Document Type: Chapter

Public Administration: Presenting for the Future Immigration Policy Reform The term "immigration reform" is used to collectively refer to all efforts that have been undertaken by a country to amend abuses and reduce faults in its immigration policy. These efforts could be geared at either promoting and encouraging immigration or reducing and even eliminating the same. A perfect example of the former is the UK's promotion of the absorption of foreign-educated health

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Distinction and Need for Governance at All Three Levels Corporate...
Words: 3850 Length: 13 Document Type: Term Paper

Corporate governance, IT Governance and Information Security Governance IS 8310 Governance, Risk Management and Compliance Governance is the process of empowering leaders to implement rules that are enforceable and amendable. For comprehensive understanding of the term' governance' it is essential to identify the leaders and the set of rules, and various positions that leaders govern. Corporate governance, IT Governance and Information Security Governance embraces a linkage with certain acquiescence system while

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now