CourseLover

(12)

$10/per page/Negotiable

About CourseLover

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Engineering,Health & Medical,HR Management,Law,Marketing,Math,Physics,Psychology,Programming,Science Hide all
Teaching Since: May 2017
Last Sign in: 293 Weeks Ago
Questions Answered: 27237
Tutorials Posted: 27372

Education

  • MCS,MBA(IT), Pursuing PHD
    Devry University
    Sep-2004 - Aug-2010

Experience

  • Assistant Financial Analyst
    NatSteel Holdings Pte Ltd
    Aug-2007 - Jul-2017

Category > Computer Science Posted 10 Jul 2017 My Price 10.00

REVISE with the instructions nothing super fancy

 

Question description

 

Cyber-Attacks; In more ways than one!

Cyber-attacks become increasingly common and life threatening, I want to devote my time for research in order to better express my personal feelings, put a stop to these attacks, and locate the best path for becoming a devoted part of the Federal Bureau Institution team. There are many different types of cyber-attacks that can take place; private, business, and identity fraud. A family member has fallen victim to this horrific crime last year when Target experienced a security breech; many withdraws were made and a great deal of money was stolen from my family. Lots of money was taken from thousands of other customers that shopped at Target within a certain time frame in 2015. “Security experts say the Target hack is a reminder of security problems facing many retailers that won’t easily go away”

Criminals will find different ways to access this information once their methods are stopped and the criminal activity will always continue, but people that choose to use cash instead of using debit, credit, or gift cards are not at risk for these cyber-attacks. It is almost safe to say that it is time to go back to our old ways of carrying cash. Another incident occurred recently when Wells Fargo “Bank employees creating fake email accounts to sign up customers for online banking services, while customers accumulating late fees on accounts they never even knew they had”

For a third example, according to New York Times the most recent biggest company was in 2015 Anthem headquarters, system was hacked over 80 million records were taken, which include social securities, birth dates and house address. This is just a few quick examples of the many of the cyber-attacks that occur each year. As future professionals it’s important to know that one day too this could happen to one’s own company. The focus is to gain as much knowledge as possible about methods that can be used to keep companies safe from potential attacks and also which type of business are more tracked. I would also like to see ways that the system has been hacked to understand the basis of it.

It is very unfortunate, for all these victims, that people identities get stolen through the hacks created through trusted businesses. This is a great research topic to focus on since there are so many cyber-attacks recently. It is better to have knowledge of these serious issues around the world, instead of being blind to the fact that this is an ongoing problem, which will not stop, in our society. This topic is important to everyone in our entire country and is mainly useful for college students that plan on pursuing a business profession or career. It is very important that students as well as the society are better informed on past and current events of these cyberterrorism events that are taking place now.

 

Answers

(12)
Status NEW Posted 10 Jul 2017 02:07 PM My Price 10.00

----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll

Not Rated(0)