Q1 Chapter 10 - From this chapter, in addition to the previous Chapters, we continue to enhance our knowledge and understanding about IG best business practices, and how good data governance can ens

The 2011 report by security experts at Intel/McAfee showed that security threats were only the rise. The experts reported that unprecedented series of cyber attacks had affected up to 72 organizations all over the world, including governments, the United Nations, and corporations (Smallwood, 2014). The incident, which occurred over a period of five years was described as the biggest transfer of wealth in terms of intellectual property. The affected governments included the United States, Canada, India, Taiwan, South Korea, and Canada (Finkel, 2011). The affected corporations included the International Olympic Committee (IOC), the Association of Southeast Asian Nations (ASEAN), the World Anti-Doping Agency among other companies, including high-tech enterprises and defense contractors.  

The attack against the United Nations involved breaking into the computer system of its secretariat in Geneva in 2008. The attacker hid within the computer system for almost two years while quietly combing through reams of secret data (Smallwood, 2014). This shows that competitors or criminals may covertly monitor an organization for a longer period. It is yet to be established where the stolen information goes to. However, it has been established that such competitive intelligence can help the government or an organization with an advantage competively, militarily, diplomatically, and economically. This implies that information assets of both government agencies and companies remain at risk, and there those who are invaded and eroded on a daily system without being detected (Smallwood, 2014). These attacks lead to loss of economic advantage and national secrets to rivals, thus the need for IG policies. The best technologies should be utilized to counter attacks.

References

Finkel, J. (2011, August 3). "State actor" behind slew of cyber attacks. Retrieved from Reuters: https://www.reuters.com/article/us-cyberattacks/state-actor-behind-slew-of-cyber-attacks-idUSTRE7720HU20110803

Smallwood, R. F. (2014). Information governance: Concepts, strategies, and best practices. Hoboken, NJ: Wiley & Sons, Inc.