IS545 Grantham Week 3 IT Security E Business and E Commerce Discussion

User Generated

fnwn1982

Business Finance

IS545

Grantham University

Description

1. Who are the potential victims of an organization’s data breach?

2. What is social engineering? Give an example

3. Explain how identity theft can occur.

4. List benefits of e-business. What are the major types of e-business transactions?

5. What is the advantage of using cloud computing as the platform for e-government?

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please find attached, lt me know if you need any clarification. Your feedback will be appreciated. Thank you.

Outline
I.

Introduction

II.

Conclusion

III.

References


Running Head: IT SECURITY AND E-BUSINESS

IT security
Name
Professor
Institution
Course
Date

1

IT SECURITY AND E-BUSINESS

2

IT security
Who are the potential victims of an organization's data breach?
Since data breach refers to both intentional and unintentional disclosure of private and
confidential information, the owners of such information are mostly affected. For instance,
celebrities are people whose parts of lives are hidden and would not want to have the public
know about such information. Also, private companies and consumers are victims of data breach.
Data breach makes organizations face the threat of losing customers thus reducing their sales
(Handbook of information security: 2, 2006). On the other hand, data breach affects customers as
they are overwhelmed with the information disclosed which may not be pleasing to them. Also,
that heads of organizations are victims of data breach, and this may affect their personal lives in
addition to their work life. Data breach only has negative impacts on the victims as they have to
face the scrutiny of the public regardless of whether the disclosed information was true or false.
Data breach remains a threat to many people and organizations and may completely affect
business operations leading to failure of organizations.
What is social engineering? Give an example
Social engineering refers to the use of deception or manipulation of individuals so that
they will readily divulge confidential...


Anonymous
Excellent resource! Really helped me get the gist of things.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags