Skip to main content

Home/ Globaltech/ Group items tagged cyberattack

Rss Feed Group items tagged

anonymous

US Report Blasts China, Russia for Cybercrime - ABC News - 15 views

  •  
    Identify the issue and scenario. Describe 3 incidents of cyberattacks by China. List some of the most desired data. Describe how the US is responding to these cyberthreats. all nov 10 kuni
  •  
    Identify the issue and scenario. China and Russia have been accused of cyber espionage, stealing technological and commercial information from The USA and its Allies. Describe 3 incidents of cyberattacks by China. 1. Google allege that intellectual property was stolen in a computer attack that also targeted at least 20 other large companies. And earlier this year Mountain View, Calif.-based Google said it believes hackers in China broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists. 2. Mandiant reported that data was stolen from a Fortune 500 manufacturing company during business negotiations when the company was trying to buy a Chinese company. 3. McAfee traced an intrusion to an Internet protocol address in China and said intruders took data from global oil, energy and petrochemical companies. List some of the most desired data. Data from global oil, energy and petrochemical companies, Fortune 500 manufacturing company, U.S. Government officials, and military's gmail accounts. Describe how the US is responding to these cyberthreats. The Pentagon has begun a pilot program that is working with a group of defense contractors to help detect and block cyberattacks. They have called for greater communication about cyberthreats among the government, intelligence agencies and the private sector.
anonymous

A Terrifying Threat Obama and Romney Aren't Talking About - Bloomberg - 7 views

  •  
    1. Identify the area of impact the scenario relates to. 2. Identify the main stakeholders to the IT system. 3. Identify and describe one ITGS social/ethical concern in the article. 4. Describe ITGS terminology and systems. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. all: Y1-2 due: oct 18+19 Palm Rot
Rot Homkrathok

20 critical security controls - 12 views

  •  
    choose 5
kentsugeno

Ebay urges users to change passwords - 0 views

  •  
    Ebay has asked users to change their passwords following a cyberattack that compromised one of its databases. The auction site said that the database contained encrypted passwords and other non-financial information. The US firm added that it had no evidence of there being unauthorised activity on its members' accounts.
anonymous

Silicon Valley: Obama calls on corporations to work with government to prevent cyberatt... - 6 views

  •  
    Who should be responsible for protecting customer data? Raya, jm
1 - 5 of 5
Showing 20 items per page