Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Hello, I am looking for someone to write an essay on IT. It needs to be at least 1500 words.Download file to see previous pages... This cyber security and the increasing cyber crime had been the great
Hello, I am looking for someone to write an essay on IT. It needs to be at least 1500 words.Download file to see previous pages...
This cyber security and the increasing cyber crime had been the greatest concern for the present as well as for the future generation. A study made in the year 2003 in the United States of America revealed that 31 percent of the respondents considered this cyber security as the second most concern after the misappropriation of the individual assets. Moreover over 15 percent among the respondents have experienced the threat of cyber security in the last two years facing a loss which most of them could not quantify in actual. However on an average measurement of the total financial cost for the last two years incurred in cyber crime valued to be about 812,318, US dollars (Smith, Grabosky, &. Urbas, 2004, p. 15). Thus the paper focus on cyber security with the main focuses on Operation Aurora. Type of breach Viruses in the computer system, defacement or the alteration of the websites along with system crashes and redirection or even misappropriation of the resources of the system are some of the breaches generally reported in regards to the cyber security (Smith, Grabosky, an Urbas, 2004, p. 15). Morgan Stanley underwent a "sensitive breach" where hackers attempted to enter its complex for six months, starting from June 2009 (Rashid, 2011). Circumstances of the occurrence of breach Operation Aurora is a large scale hacking that victimized even Google and Morgan Stanley along with about 200 other companies with most of their identities not yet revealed. They had made the breach occurring in Google public in the month of January 2010. However they kept the hacking of the company of DuPont secret. Fear of the affect on the investors of the company in revealing the hacking or the breach was the reason behind the secrecy maintained by the company to the public. The seriousness of the issue of this cyber hacking forced the white house in engaging a senate task force for reporting and investigating in the security issues of this cyber world. The recent trend of the online attacks in targeting the renowned international companies reveals the cyber insecurity of the corporate world. In order to prevent the dangerous trend from persisting and even increasing the companies have to undertake own initiative in ensuring steps for the security of their own data served online. According to the Whitehouse, theft and piracy are engaging in the transfer of wealth that is the biggest in the planet history and the victim companies stands on the ultimate losing end. Another incident of an attack launched in the year 2009 that had the Chinese base had targeted the energy companies. The security firm of McAfee reported the attack named as “Night Dragon”. However the identity of the targeted company was not disclosed by the report published by McAfee. But the emails of the company of HBGary Federal had with it the lists of the name of the targeted companies. According to the lists the companies were Exxon Mobil, Royal Dutch Shell, General Electric, Marathon oil along with ConocoPhillips and BP. (Liebowitz, 2011) Operation Aurora even imposes a break in the network security of the bank, Morgan Stanley.