American College of Commerce and Technology Discussion Responses

User Generated

Tbyqra_fgngr

Business Finance

American College of Commerce and Technology

Description

Unformatted Attachment Preview

1. Pick a company (of your choice) that had a recent data breach (cyber-attack) and describe the extent of the incident in this organization. Be sure to describe the source(s) of cyberthreats that are putting organizations in jeopardy and the one that hit your chosen company if known. This Equifax, one of the largest credit agencies in the United States, stated the vulnerability of application on one of their websites resulted in a data breach exposing about a 147,9 million customers on September 7, 2017. The breach was revealed on 29 July, although the firm believes it probably began in mid-May. The breach has affected 143 million consumers' personal data (such as social security numbers, birth date, addresses, as well as sometimes drivers' licenses); 209,000 consumer data have also been exposed to the credit card data. In October 2017, that number was increased to a 147.9 million. A variety of response and security deficiencies have been caused by Equifax. The main issue was the uncontrolled application vulnerability allowing attackers to access (Tschakert, Needles & Holtzblatt, 2016). Inadequate system separation made it simple for the attackers to migrate laterally. Equifax also reported the breach slowly. 2. Describe the targets of cyberattacks and the impact these attacks have on both public and private sector organizations. Explain why you think your chosen company was targeted. The cyber security threat relates to all possible malicious attacks aimed at illegally accessing data, interrupting digital operations or damaging information (Tariq, 2018). Different actors, such corporate spies as well as terrorist groups, hacktivists, hostile governments, criminal organizations, lone hackers as well as disgruntled workers, may cause cyber threats. The breach of Equifax is in extent and severity unprecedented. In the past, other businesses have had worse data breaches, but the sensitivity of an Equifax's personal information as well as the extent of the issue make that violation unprecedented. 3. Explain why cyber risk management must be a top business priority and outline an organizational model for cybersecurity. Risk management for cybersecurity is a process of identifying possible risks, evaluating the effects of those risks and preparing how to respond if risks come true (Tariq, 2018). Each business, regardless of its size or sector, has to establish a cybersecurity management strategy. 4. Describe the internal audits and controls that are used to defend against occupational fraud at all levels of an organization. The internal audit function is to ensuring independently that the risk management, internal control & governance systems of the company operate properly (Yeboah-Ofori & Islam, 2019). 5. Explain how risk management frameworks, standards, and models help ensure compliance with industry and federal regulations. Assess the risk associated with a network crash, debilitating hacker attack, or other IT disruption. Explain how compliance and security can diverge such that being compliant is not necessarily equivalent to being secure. (Home Depot, Target, and a myriad of others were all PCI compliant.) A properly established risk management process helps to guarantee that internal, industry, as well as federal requirements, are complied with. Risk management allows solving important problems relating to compliance, internal control, financial accountability as well as internal audit procedures with current laws. This method enables businesses to keep federal and industry laws in compliance. References Yeboah-Ofori, A., & Islam, S. (2019). Cyber security threat modeling for supply chain organizational environments. Future Internet, 11(3), 63. Tschakert, N., Needles Jr, B., & Holtzblatt, M. (2016). The red flags of fraud: internal auditors' knowledge of the business makes them ideal candidates to detect unethical behaviors. Internal Auditor, 73(5), 60-65. Tariq, N. (2018). Impact of cyberattacks on financial institutions. Journal of Internet Banking and Commerce, 23(2), 1-11. 1. Pick a company (of your choice) that had a recent data breach (cyber-attack) and describe the extent of the incident in this organization. Be sure to describe the source(s) of cyberthreats that are putting organizations in jeopardy and the one that hit your chosen company if known. This threat assessment examines the cybersecurity of the oil and gas industry and suggests steps that can be taken to reduce its vulnerability to cyber-attacks and, if these attacks are successful, to prepare for the possible impact on energy security. The oil and gas industry is considered a strategic sector that is vitally important to national and international security. It is a significant and long-standing source of income and employment for the economy, yet it is also considered an area of weakness in terms of cybersecurity. 2. Describe the targets of cyberattacks and the impact these attacks have on both public and private sector organizations. Explain why you think your chosen company was targeted. This attack was on a major oil and gas company and is one of the more destructive ones we’ve seen. It’s an example of how cyberattacks can result in significant physical damage to a company’s operations. CISOs can help the organization take defensive steps to protect against future incidents. 3. Explain why cyber risk management must be a top business priority and outline an organizational model for cybersecurity. The IT security community was gaining momentum on security, the cyber domain was also in the midst of development; new cyber-attacks and attacks that had not been anticipated were surfacing daily (Jones, K. 2015). The following are the examples of such attacks that had not been anticipated as part of the IT security community’s evolution. The first attack that hit the Internet and the focus of this attack is the breach of Sony’s.data network. 4. Describe the internal audits and controls that are used to defend against occupational fraud at all levels of an organization. Internal audits are designed to ensure that the financial statements that are used for auditing represent fair values in accordance with accounting policies and standards (Nakabuye, Z. 2017). In practice, a company's auditors are a diverse group of people brought together to meet the specific needs of the company, the company's shareholders and/or the company's auditors. 5. Explain how risk management frameworks, standards, and models help ensure compliance with industry and federal regulations. Assess the risk associated with a network crash, debilitating hacker attack, or other IT disruption. Explain how compliance and security can diverge such that being compliant is not necessarily equivalent to being secure. (Home Depot, Target, and a myriad of others were all PCI compliant.) The risk assessment process helps understand the risk. It allows an organization to identify risk threats and assess how they affect the organization. It is also used to help identify risks and weaknesses (Lubobya, C. S). In this step, risk assessment involves identifying the vulnerabilities, threats, and risks and analyzing how these factors might influence the organization and its functions. The risk assessment process also helps an organization to identify and analyze the risk associated with a business activity. The process involves a series of steps to help assess risk. References Mwila, K. A., & Lubobya, C. S. An Assessment of Cyber Attacks Preparedness Strategy for Public and Private Sectors in Zambia. Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 9, 52-80. Kabuye, F., Nkundabanyanga, S. K., Opiso, J., & Nakabuye, Z. (2017). Internal audit organisational status, competencies, activities and fraud management in the financial services sector. Managerial Auditing Journal. Find and view several online videos on unified communications. Identify the URLs for three that you think do a particularly good job illustrating the characteristics and capabilities of UC systems. Select the one that you think is best and briefly justify your selection. Unified Communication (UC) is a strategic business and marketing concept that integrates all the enterprise communication channels. “Investing in a unified communications platform is one of the best business decisions you can make” (Smith, 2019). It allows all your employees to communicate and collaborate in one channel, improving operational efficiency. In this regard, the UC channel combines all enterprise communication platforms for voice mail, classic telephony, optimized communication, video conferencing, and email, to mention but a few. As explained in the video: What is Unified Communications? - UC Today News, now that a significant section of the world population is working online, communication has never been more important. As such, streamlining the communication platform through UC principles is essential in ensuring employees collaborate effectively without the hassles of advanced technologies. Keeping people connected and collaborating is ideal in the modern business environment where teleworking is preferred by many workers. In this video by Fusion Connect, the presenter explains how a Unified Communications – WebEx improves productivity. It allows employees to hold virtual meetings with over 1 000 participants to share files, instant messages, record, and transcribe. As a flexible and cost-effective UC tool, WebEx can help businesses streamline communication and collaboration without incurring huge costs. Lastly, the video on Weave - a UC tool has best illustrated the capabilities and characteristics of a unified communications system. This video explains how these systems can transform operational efficiency in an organization through enhanced mobility and accessibility, increased worker satisfaction, seamless collaboration, centralized information, cost-saving, and integration with other business tools. References FusionWorks with Cisco Webex. (2021, March 9). Retrieved from https://www.youtube.com/watch?v=mJrot6jNoRY What is unified communications? (2020, August 29). Retrieved from https://www.uctoday.com/unified-communications/what-is-unifiedcommunications/ Why weave? (2019, December 10). Retrieved from https://www.youtube.com/watch?v=pLGUUZArPdo Find and view several online videos on unified communications. Identify the URLs for three that you think do a particularly good job illustrating the characteristics and capabilities of UC systems. Select the one that you think is best and briefly justify your selection. The UC systems are also called unified communications. In various businesses, the systems that will consolidate more than one communication via a system of the phone are referred to as systems of unified communication. Various ways are present through which the communication in the business takes place such as phone calls, video conferencing, SMS, and emails. So this will produce support to all the businesses to analyze one another so that it can run concurrently as only a single system. I have viewed various videos related to the unified communications. More than three videos have taken my attention. So in this discussion, I am more engrossed in explaining the video which is posted by the first communication. I also have my point of view as well as thoughts on these videos. So I have selected one of these three videos and here I am explaining that one video which I have to choose from three. This channel has its perspective as well as style of describing the topics. I am also fascinated with the information related to the unified communications which I have collected. The primary thing is that the communications will be much simple by utilizing the unified communications. The unified communications are the combination of distinct methods of communication of a telephone network that is included in the business or maybe other work that will be related. This also includes emails, texting, calls on the telephone, and also conferencing via telephone. Some of the benefits of unified communication include the productivity of the employee will be enhanced, collaboration, the agility of the firm will be expanded, the remote employees will be connected, and security of the information technology will also be strengthened. Sharing of the screen, messaging, layouts of the video, meeting transcription and virtual backgrounds are some other experiences of unified communication (Kumar & Sakthivel, 2020). References Youtu.be (2020) “The Importance of Unified Communications” https://youtu.be/uKBfVFkMZM Youtu.be (2020) “Unified communications” https://youtu.be/Erh9qRkU2Ms Kumar, A. A., & Sakthivel, R. (2020). An Impact of Diversification on Multinational Organisations-A Case Study Conducted In Trade Kings, Zambia. International Journal of Transformation in Operational & Marketing Management [ISSN: 2581-4842 (online)], 4(1). http://management.eurekajournals.com/index.php/IJTOMM/article/downl oad/408/467
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

1

Response to Students’ Posts

Name
Institution
Course
Professor
Date

2
Response to Students’ Posts
Response to Raghavender
I agree with your post that unified communications refer to the integration of several
modes of communication over a telephone network that is used in a company or other related
activity. This also covers emails, text messages, telephone conversations, and telephone
conferencing. Among the advantages of unified communication are increased employee
productivity, cooperation, increased business agility, connectivity of distant workers, and
improved information technology security. It is also imperative to note that A fundamental tenet
of UC is the ability for individuals to communicate ad hoc within their current working
environment. It is possible to associate available statuses with any item inside third-party
applications through technological protocols (Beltran & Bertin, 2015). As such, users of the
program may communicate with the writers of electronic records without learning about their
name, contact information, or present accessibili...


Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Related Tags