Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Hello, I am looking for someone to write an essay on Assignment 2: Hacking the AIS. It needs to be at least 1250 words.Business systems have also been a target by hackers due to the content of the cri

Hello, I am looking for someone to write an essay on Assignment 2: Hacking the AIS. It needs to be at least 1250 words.

Business systems have also been a target by hackers due to the content of the critical information they might be holding in their systems. Among the vital business systems that were a victim of hacking is the Anthem Inc., a giant health insurance based in New York. Hackers had breached the business’s computer the personal information of tens of millions of customers and employees was at risk. Hackers infiltrated a database containing records of as many as 80 million people. accessing customers information. Some of the customer data might also have included details on their income. However, it appeared that the data stolen did not include medical information or credit card numbers of the customers (Aickelin et al., 2013).

The company’s response to this security breach was prompt. The company’s first response was immediate notification to the FBI after observing suspicious network activity. This action was necessary since it’s the responsibility of the company to guarantee the security of the data of their customers. Speed is a critical aspect when notifying law enforcement of an intrusion since cyber criminals&nbsp.has the ability to terminate important evidence that can be used to identify people who are responsible for a given act. The action of the company to react promptly after noticing suspicious activities on the web was imperative since it gave the security personnel adequate time to gather the necessary evidence in time before the hackers destroyed it. Subsequently, the company established a website where members could access information about the situation. This action was in responding to the security breach. Allowing the members obtain information about the status would also help report any developing of the situation to the security personnel that possibly could use in one way or another in identifying the hackers or recover the data (Bento & Bento 2014). Besides, the company also dedicated a toll-free

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question