Cyber-Attacks and Risk Management
Consider your organization or another organization that has been affected by a cyber-attack. Feel free to research current events on this topic if you do not have personal experience with an organization who has been affected by a cyber-attack. Once you have selected an organization, answer the following questions:
- Provide a summary of the organization you have selected.
- What type of cyber-attack occurred?
- How did the attack occur?
- As a business manager, what are some recommendations you would make to the organization, from a business perspective, to better defend itself in the future?
- What steps can the business take to better support IT security? Explain.
Embed course material concepts, principles, and theories, which require supporting citations along with at least two scholarly peer reviewed references supporting your answer.
Use APA style guidelines.
You are required to reply to at least two peer discussion question post answers to this weekly discussion question and/or your instructor’s response to your posting. These post replies need to be substantial and constructive in nature. They should add to the content of the post and evaluate/analyze that post answer. Normal course dialogue doesn’t fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.
Required
- Chapter 5 in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability
- Altuntas, M., Berry-Stölzle, T. R., & Hoyt, R. E. (2020). Enterprise Risk Management Adoption and Managerial Incentives. Journal of Insurance Issues, 43(2), 1–42. Retrieved from https://csuglobal.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=145969927&site=eds-live
- Öbrand, L., Holmström, J., & Newman, M. (2018). Navigating Rumsfeld’s quadrants: A performative perspective on IT risk management. Technology in Society, 53, 1-8.