logo

Patching Rhododendron Application

This workbook contains 15 short, incremental steps of a breach scenario for cybersecurity communications professionals.

4 Pages883 Words113 Views
   

Added on  2022-08-15

About This Document

DATA PROTECTION IN CYBER WORLD 1 DATA PROTECTION IN CYBER WORLD DATA PROTECTION IN CYBER WORLD Name of the Student Name of the Organization Author Note Rhododendron application needs to be patched as per the U.S. As per the reports, the employee was logging in from different suspicious locations and was removing data from different Consumer Services group. The employee could easily access the Complaint Resolution databases that consist of consumer credit reports. Federal Trade Commission Act- This act lays down that the consumers or the stakeholders of

Patching Rhododendron Application

This workbook contains 15 short, incremental steps of a breach scenario for cybersecurity communications professionals.

   Added on 2022-08-15

ShareRelated Documents
Running head: DATA PROTECTION IN CYBER WORLD
DATA PROTECTION IN CYBER WORLD
Name of the Student
Name of the Organization
Author Note
Patching Rhododendron Application_1
1
DATA PROTECTION IN CYBER WORLD
Rhododendron application needs to be patched as per the U.S. Computer Emergency
Response Team that is a Department of the Homel and Security. The application has its play
in all the lines of the business of Aliceo Inc and thus this should be fixed as soon as possible.
The credentials of an employee named Catalina Garcia in Buenos Aires is being used to log
in to the system in Mainland China. As per the reports, the employee was logging in from
different suspicious locations and was removing data from different Consumer Services
group. The data was mainly being removed from the Complaint Resolution group. The
employee could easily access the Complaint Resolution databases that consist of consumer
credit reports. The Complaint Resolution database does not seem to be patched for the flaw
that was encountered in Rhododendron. The case was different from what is seemed to be as
the employee was the victim here. She was new to the system and due to the flaw in the
Rhododendron application her credentials were stolen and were being misused. The cyber
criminal has taken the advantage of the flaw to gain access to the consumer databases. The
activity has been going on for more than two weeks in the late hours when there are less
number of staffs. This can lead to a drastic effect on the business of the firm as the employees
as well as the consumer’s data are at stake.
The laws that come into the scenario are as given below:
1. CCPA or the California Consumer Privacy Act is the state statute that intends to enhance
the privacy rights along with consumer protection for the residents of California in United
States (Goldman, 2019). The act has been laid down for providing California residents with
the right to know what data is being collected, have a knowledge what is happening of their
data, request a business to delete their data and many more aspects as such.
2. Federal Trade Commission Act- This act lays down that the consumers or the stakeholders
of data should be well informed about the way their data is being used and no organization or
Patching Rhododendron Application_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Cyber Security in PDF
|7
|1242
|13

Computer law Crime and Investigation Report 2022
|5
|733
|26

Comparison between Laws of Pennsylvania and California Assignment 2022
|5
|1065
|23

Principles of Cyber Security: The Cyber Law of War
|5
|1042
|268