Question: THIS QUESTION IS REGARDING COMPUTER SECURITY; Appraise common threats to and attacks against organization assets. Review the CMI Case study and provide a detailed analysis

THIS QUESTION IS REGARDING COMPUTER SECURITY;

Appraise common threats to and attacks against organization assets.

Review the CMI Case study and provide a detailed analysis of the firms security vulnerabilities, risks, and exploitations.

Real-World Case Study: Cyber Marketing Inc. (CMI) Cyber Marketing Inc. (CMI) is a marketing company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, CMI specializes in marketing products and services online for their customers. CMI employs over 600 employees and has been experiencing consistent growth keeping pace with S&P averages (approximately 8%) for nearly six years. A well-honed management strategy built on scaling operational performance through automation and technological innovation has propelled the company into the big leagues; CMI was only recently profiled in Fortune Magazine. CMI has experienced several cyber-attacks from outsiders over the past a few years. In 2012, the Oracle database server was attacked and its customer database lost its confidentiality, integrity, and availability for several days. Although the company restored the Oracle database server back online, its lost confidentiality damaged the company reputations. CMI ended up paying its customers a large sum of settlement for their loss of data confidentiality. Another security attack was carried out by a malicious virus that infected the entire network for several days. While infected the Oracle and e-mail servers had to be shut down to quarantine these servers. In the meantime, the company lost $1.700, 000 in revenue and intangible customer confidence. Theres no question that the companys CEO sees the strategic importance of technology in executing his business plan, and in this way you share a common basis of principle with him: that IT is a competitive differentiator. However, you believe that diminishing internal IT services risks security and strategic capability, whereas the CEO feels he can acquire that capability immediately at a low cost through the open market.

PLEASE MAKE COPY PASTE AVAILABLE

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!