Hacking the AIS
Technological advancements have predisposed many businesses across the globe to challenges related to system manipulation and hacking. Connectivity technology and the internet have eliminated almost all communication barriers that businesses and individuals faced previously. Some of the dangers and risks associated with these advancements include an increase in cyber criminals who invade into the private databases of companies and individuals. For this assignment, I will focus on JP Morgan hacking. This company is the most recent example of how a serious data breach can cause harm to not only the business but to also millions of individuals. The essay discusses the responsibility of the software provider in ensuring that the entity and its customers are guaranteed that their information is protected. Some of proposals are given for businesses such as JP Morgan so that they can ensure that their systems cannot be manipulated in future.
Background Information on JP Morgan
On October 2014, JPMorgan became a victim to cyber criminals when its systems were hacked. The incident was recorded as the largest theft of customer information from an American bank ever to happen in the US. When they broke into its computer systems, they exposed personal data of over 83 million accounts. The exposed data contained customer addresses, names, emails and phone numbers. The hackers entered the database via a compromised app which belongs to the company. This affected present account holders, former account holders, and individuals who had entered their contact details at the company’s mobile and online sites.
Company’s Level of Responsibility in Responding to the Security Breach
JPMorgan could have thwarted the data intrusion by installing a simple security fix to a server, which had been previously overlooked. The company spends huge amounts of money on computer security to protect against complex attacks like this one. However, JPMorgan seems to have ignored its responsibility. The attack started when the hackers stole the login details of one employee. This is the point at which the company could have countered the attack. A double authentication scheme called two-factor authentication could have been installed to prevent access to employees’ computers. Two-factor authentication demands a second one-time password for the user to access a protected system. Apparently, JPMorgan ignored to upgrade one of their network servers using the dual password system. This rendered the institution vulnerable to the attackers. The biggest problem is that...
References
Rajagopal, ., & Behl, R. (2016). Business analytics and cybersecurity management in organizations. Hershey: Business Science Reference.
Phys.org, (November 10, 2015). JP Morgan Chase breach was among the biggest in recent years. Phys.org - Science and Technology News, 2015-11.
In Bryant, M. (March 10, 2016). How to stay ahead of cybercriminals in the data breach era. Thenextweb.com, 2016-3.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now