Note:- Can we make one POSTER with Plag REPORT same as B30738
( NO COPY PASTE) same means same structure and have to choose topic from the question please choose different than B30738 .
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
LOGOLOGO Computer system and security •Security incident in Thomas cook •The deliberate and malicious attempt which is being made by individual for breaching information system of firm isreferredtoascyberattack. The attack has been occurred in Thomas Cook where names, flight details and emailaddressesofcustomersare exposed.TheNorwegiansecurity researcher named Roy Solberg, have accessed data of customers via usage ofvulnerabilitiesthatexistwithin systemsofThomasCook.Itwas identified that less then 100 bookings were accessed and only Solberg have exploited security issues. The attack tookplaceduetoNorwegiansite airshoppenofThomasCookwhere customers were able to buy duty-free and upgrades items. •Cyber Security Au, C.H. and Fung, W.S., 2019. Integrating knowledge management into information security:Fromaudittopractice. InternationalJournalofKnowledge Management (IJKM), 15(1), pp.37-52. •Ethical, social and legal issues Ethical, social and legal issues In context of ethical and social aspects the details of customers of Thomas Cook have been compromised and this included all the details from 2013. It became necessary for firm to inform their customers about the samelikewhatisbeingaccessedby intruders. Impact of legal, ethical and social aspects on cyber security incidents The influence that is being created by these aspects is wide and it becomes for firm to deal with these in effectual manner.•References •The process or state to protect and recoverdevices,programsand network from any kind of cyberattack isknownascybersecurity.The practiceisbeingutilizedby enterprisesandindividualsfor protectingagainstanyunauthorized access to computerized systems along withdatacenters.Byoptingfor relevantstrategiesandpolicies Thomas Cook might have prevented theirsystemfromgettingattacked. Firmmusthaveutilizedstrong encrypting algorithms that would have aided them within preventing access to the information. •Security and privacy issues of modern technologies •Security & privacy issues of modern technologies •With rapid evolution of technology, people have become more dependent on this aspect and tends to learn more. This makes them to conduct activities whicharenotethicallyappropriate and are termed as cyber attack. The security issues are: •Unauthenticated access •Identity theft •Virus, malware or worms attack •Data breach •Thesecurityincidentwhere information is accessed by individuals without any kind of authorization is called data breach. In Thomas Cook