Access over 20 million homework & study documents

Postings.edited

Content type
User Generated
Subject
Management
Type
Homework
Rating
Showing Page:
1/3
Running head: RESPONSE TO HACKING AND UNLAWFUL COMPUTER INTRUSION 1
Response to Hacking and Unlawful Computer Invasion
Student’s Name
Institution Affiliation
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3
RESPONSE TO HACKING AND UNLAWFUL COMPUTER INTRUSION 2
Discussion 1
I agree that it is almost impossible to keep hackers away in cybersecurity. These attackers
commonly perform phishing, a technique that involves calling and emailing victims to get their
confidential information and passwords (Alassouli, 2020). Creating awareness about phishing and
how to avoid it is a good preventive measure. In 2017, the US government’s electricity grid was
breached, and the attackers remotely entered the grid’s system through email links accessed all the
data containing details of major energy systems and their control systems. They then modified the
networks and gathered the government’s confidential information, posing a national threat. With
this example, it is indeed critical for one to be careful when opening any links or attachments
online.
Discussion 2
As a matter of fact, the illegal intrusion of another person's computer with an intent of
changing or altering existing data or steal can cause severe disruptions or damage to the computer
network. For instance, in Software AG, a Germany based company, its systems were attacked.
However, the company maintained that they were unaffected and that the hackers accessed no
customer information. Later on, however, the company admitted to data theft, together with a $20
ransom demanded by the attackers. Unlawful invasion of computers can therefore lead to adverse
effects such as loss of information, customers, finances and contracts (Cohen, 2017). With
Software AG as an example, what are the various policies that a company could implement to
shield itself from unlawful computer intrusion?

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Running head: RESPONSE TO HACKING AND UNLAWFUL COMPUTER INTRUSION Response to Hacking and Unlawful Computer Invasion Student’s Name Institution Affiliation Date 1 RESPONSE TO HACKING AND UNLAWFUL COMPUTER INTRUSION 2 Discussion 1 I agree that it is almost impossible to keep hackers away in cybersecurity. These attackers commonly perform phishing, a technique that involves calling and emailing victims to get their confidential information and passwords (Alassouli, 2020). Creating awareness about phishing and how to avoid it is a good preventive measure. In 2017, the US government’s electricity grid was breached, and the attackers remotely entered the grid’s system through email links accessed all the data containing details of major energy systems and their control systems. They then modified the networks and gathered the government’s confidential information, posing a nati ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4