logo

cyber security threats and attacks

4 Pages749 Words141 Views
   

Added on  2021-04-24

cyber security threats and attacks

   Added on 2021-04-24

ShareRelated Documents
Running head: SECURITY THREATSecurity ThreatName of the StudentName of the UniversityAuthor Note
cyber security threats and attacks_1
1SECURITY THREAT1.The attack on eBay was a result of Cyber attack. Cyber attack is an intended exploitationof systems, networks and technology dependant enterprises (Turban et al., 2015). It usesmalicious codes to change the logic, data or the computer codes that lead to disruptiveconsequences. It results into cybercrimes which poses compromising of data such as informationtheft or identity theft. The attackers had stolen the information such as email addresses,encrypted passwords, birth dates and other related information of the company’s users. It waslater found that the hackers used employee credentials which were an easy method to hack thesystem (Finkle, 2014).2.eBay is a multinational e-commerce operating corporation. It was established in 1995 byPierre Omidyar. It is headquartered at San Jose, California, U.S. It provides consumer toconsumer and business to consumer sales service through website (Schultz & Block, 2015). Thecompany operates eBay.com, online auction and a shopping website where people and businesscan buy and sell varieties of products and services. Other than this, it includes services likeonline ticket trading of events and money transfer services.3.Security life cycle model follows the process of identifying, assessing, protecting andmonitoring the system. This helps the organization keep its system improving and changing withtime towards more secured networks. However, this model can be useful to avoid cyber threatsby continual monitoring and implementing strategies to overcome with the help of implemented
cyber security threats and attacks_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
System Security: Data Breach Attack on eBay and WannaCry Ransomware Attack
|8
|1892
|123

JP Morgan Data Breach
|5
|722
|96

Data Breach - Cyber Security
|4
|752
|406

Critical Analysis of Yahoo's 2014 Data Breach
|5
|1125
|278

PRINCIPLES OF MANAGEMENT {MBA133} CIA - 3 INFOGRAPHICS
|6
|1233
|64

Cyber Security Management Plan on E-Marketing
|20
|5698
|36