Access over 20 million homework & study documents

Chapter Discussion

Content type
User Generated
Subject
Management
School
Ottawa University
Type
Homework
Rating
Showing Page:
1/6
Running Head: CHAPTER DISCUSSION 1
Chapter Discussion
Name
Instructor
Institutional Affiliation
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/6
CHAPTER DISCUSSION 2
CHAPTER 1, 2
1. What or who do you think is the greatest threat to the security of information
today? What computer security incidents have been in the news recently?
The biggest and most severe threat facing the security of information today for both small
and large businesses is the phishing attack. Phishing attack accounts for about 90% of all
breaches reported by organizations today. This type of attack has grown by over 65% over the
last year and accounts for about $12 billion in losses reported by businesses and organizations.
Ideally, a phishing attack occurs when the attacker pretends to be a trusted contact and
commands the user to click malicious links and download a malicious file or even grant access to
sensitive and private information of the organization (Witts, 2021). This form of attack has grown
over the past year and continues to present a major problem to organizations both small and
large.
With the growth in sophistication in the manner in which these forms of attack are being
presented, the attackers are becoming more convincing in pretending to be legitimate business
contact thus making it difficult to be detected. It also accounts for the highest number of
Business Email Compromise as it involves attackers using phishing campaigns to steal business
email account passwords more so from big businesses and their high-level executives (Witts,
2021). Once they succeed in stealing these business contacts they use these accounts to
fraudulently access payments. A notable incident of such an attack is the case of the American
Armed Forces Mutual Aid Association which occurred on January 29
th
, 2021.
2. What policies govern your behavior currently, in school, work, or in other
organizations? Are those policies enforced/followed? Why or why not?
As an individual, policies such as responsible use of organizational resources are critical
and help guide my behavior. Responsible use policy in other words allows one to take
responsibility and ensure that his/her behaviors online reflect what is best for the company. In
our organization, these policies are enforced, however, they have also become part of the
organization and every employee is expected to follow them.
CHAPTER 3, 4
1. Who ultimately has ultimate responsibility for the computer security policies and
organization implements and why? Consider the data owner, system owner,
executive management, CIO, CEO, and the company’s Board members?
The CEO has the ultimate responsibility of ensuring the computer security policies are
developed and implemented within the organization. Fundamentally, the CEO is a member of the
company’s executive management. He must ensure that the CIO, IT experts, and other
department heads have met and in consultation with the rest of the employees, have developed

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/6

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 6 pages?
Access Now
Unformatted Attachment Preview
Running Head: CHAPTER DISCUSSION 1 Chapter Discussion Name Instructor Institutional Affiliation Date CHAPTER DISCUSSION 2 CHAPTER 1, 2 1. What or who do you think is the greatest threat to the security of information today? What computer security incidents have been in the news recently? The biggest and most severe threat facing the security of information today for both small and large businesses is the phishing attack. Phishing attack accounts for about 90% of all breaches reported by organizations today. This type of attack has grown by over 65% over the last year and accounts for about $12 billion in losses reported by businesses and organizations. Ideally, a phishing attack occurs when the attacker pretends to be a trusted contact and commands the user to click malicious links and download a malicious file or even grant access to sensitive and private information of the organization (Witts, 2021). This form of attack has grown over the past year and continues to present a major problem to organizations both small and large. With the growth in sophistication in the manner in which these forms of attack are being presented, the attackers are becoming more convincing in pretending to be legitimate business contact thus making it difficult to be detected. It also accounts for the highest number of Business Email Compromise as it involves attackers using phishing campaigns to steal business email account passwords more so from big businesses and their high-level executi ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4