consider your organization or another organization that has been affected by a cyber attack 1
Feel free to research current events on this topic if you do not have
personal experience with an organization who has been affected by a
cyber-attack. Once you have selected an organization, answer the
following questions:
- Provide a brief summary of the organization you have selected.
- What type of cyber-attack occurred?
- How did the organization respond to the attack?
- What were the impacts (or potential impacts) to the business?
- What were the costs associated with the attack? If you do not have actual numbers, what types of costs were likely involved?
- What did the organization do to mitigate the risk of future attacks? Did the organization change its processes or procedures?
- As a business manager, what are some additional recommendations you would make to the organization, from a business perspective, to better defend itself in the future? What steps can the business take to better support the IT (information technology) department’s security efforts? Explain.
- Embed course material concepts, principles, and theories, which require supporting citations along with at least two scholarly peer reviewed references supporting your answer. Keep in mind that these scholarly references can be found in the Saudi Digital Library by conducting an advanced search specific to scholarly references.
- One Page Only
- Chapter 5: Cybersecurity and Risk Management Technology in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability
- 4 keys to cyber threat detection. (2017). Securityinfowatch.com.
- Kelly, S. (2017). Fighting the cyber threat. Public Utilities Fortnightly, 155(1), 54-55.
- Öbrand, L., Holmström, J., & Newman, M. (2018). Navigating Rumsfeld’s quadrants: A performative perspective on IT risk management. Technology in Society, 53, 1-8.
- Vincent, N. E., Higgs, J. L., & Pinsker, R. E. (2017). IT governance and the maturity of IT risk management practices. Journal of Information Systems, 31(1), 59-77.