Category: Cyber security

  • Developing a Cyber Incident Plan for Lost Coffee Introduction: Lost Coffee is a popular coffee shop chain with multiple locations across the country. As with any business that operates online and stores sensitive customer information, Lost Coffee is at risk of cyber attacks. In order

    i want to provide you information about a cyber incident plan about a coffee called lost I already gather the information and I want you to do me a plan same as the example on the word I want to see table and workflow and add more information based on the excal file and the word

  • Title: Legal and Ethical Implications of Malware in Mobile Apps

    Assume you purchase a mobile app for editing videos. You find out a few months later that malware was installed on your device when you installed the video-editing app. The malware was a keystroke logger, which gathered your banking password, and resulted in funds being stolen from your checking account.
    You check the end-user license agreement (EULA) for the video-editing app and find that you cannot sue the company nor can you get your money back.
    Answer the following question(s):
    What next step would you take, if any, against the app company to get satisfaction? Why?
    Would this situation change your behavior before installing new apps in the future? Why or why not
    Agree or Disagree? Why or Why Not?
    What next step would you take, if any, against the app company to get satisfaction? Why?
    Would this situation change your behavior before installing new apps in the future? Why or why not?
    As Grama (2022) states, the terms of the contract that you signed are binding if it is an enforceable contract, so your ability to take legal action may be limited.  However, stealing your personal information is an illegal act, and that would call into question whether or not the contract is enforceable. The next step is to seek out legal advice on the case with a lawyer who would be able to identify what opportunities there might be to resolve the situation.  
    The prompt reminded me of policies that I have to follow regarding signing EULAs as an University of Illinois employee, even for free software (illinois.edu, n.d.).  Contracts can be tricky and need to be reviewed carefully.  If this were to happen in an enterprise situation, University data could be compromised.  As noted in the policy, employees who are not given signature authority can’t sign even free software agreements.  This is to help promote a safer computing environment on campus. 
    References
    Grama, J. L. (2022). Legal and privacy issues in information security (Third edition). Jones & Bartlett Learning.
    illinois.edu. (n.d.). Contracts and Templates. University of Illinois. Retrieved May 3, 2024, from https://www.uiucpurchasing.illinois.edu/introduction-to-contracts/

  • Title: The Appeal of Financial Information to Organized Criminals and the Challenges of Prosecution in Overseas Breaches

    Please Seperate Each Response!!
    The Verizon 2020 Data Breach Investigations Report indicates that organized criminal groups were behind 55 percent of breaches, and 86 percent of breaches were financially motivated. (Note that Verizon points out that their use of the term “organized crime” refers to a criminal with a process and not necessarily the mafia.)
    Answer the following question(s):
    Why do you think financial information is such a popular target of organized criminals versus other types of data that can be sold on the dark web? Explain your answer.
    When the criminal group is located in a country outside of the U.S., prosecution is difficult or impossible. What type of method could be used to get some justice after a successful financial breach by an overseas criminal group?
    Agree or Disagree? Why or Why Not?
    Why do you think financial information is such a popular target of organized criminals versus other types of data that can be sold on the dark web? Explain your answer.
    Criminals exploit financial information for immediate and substantial financial gain. The reasons behind this preference are clear: ease of use, global acceptance, low risk, and high demand. These factors attract criminals and pose a significant threat to our financial security, making it crucial to understand why financial information is a primary target.
    Financial information is a direct route to monetary gain for criminals. It is relatively easy to use for fraud, has a broad global reach, and carries a lower risk of immediate detection. However, what truly amplifies its appeal is the existence of established underground markets to sell this information. These factors make financial data a highly sought-after target for criminals involved in identity theft, fraud, and economic crimes, posing a significant threat to our financial security.
    What Is the Dark Web? How It Works & Why It’s So Dangerous. https://www.aura.com/learn/dark-web. Accessed 1 May 2024.