Cyc3704 Assignment 1

723 Words 3 Pages
All required textbooks are listed and available for download on the course Syllabus.
Information Security for Non-Technical Managers, E. Gelbstein (2013), pp. 12-71.
Internet and Technology Law: A U.S. Perspective, K. G. Kustron (2015), pp. 25-53.
Law for Computing Students, G. Sampson (2009), pp. 79-101.
Select three examples of where a company’s data security was breached from the outside. What do your examples have in common? What important lessons can the e-business community learn from these events?

Data security breach occurs when sensitive, secured or private information are been accessed or viewed, stolen or used by an individual who hasn’t gotten the authorization to use it. The information acquired during the breach may include
…show more content…
(2013). Information Security for Non-Technical Managers (pp. 12-71). Retrieved December 24, 2015, from http://my.uopeople.edu/pluginfile.php/94498/mod_page/content/22/InformationSecurityForNonTechnicalManagers.pdf
Sampson, G. (2009). Law for Computing Students (pp. 79-101). Retrieved December 24, 2015, from http://my.uopeople.edu/pluginfile.php/94498/mod_page/content/22/LawForComputingStudents.pdf
Kustron, K. G. (2015). Internet and Technology Law: A U.S. Perspective (pp. 25-53). Retrieved December 24, 2015, from http://my.uopeople.edu/pluginfile.php/94498/mod_page/content/22/InternetAndTechnologyLawAUSPerspective.pdf
New Emergency. (n.d.). eBay Hacked: 145 Million Customers Must Change Password. Retrieved December 25, 2015, from http://www.emergencyemail.org/newsemergency/anmviewer.asp?a=3831&z=5
University of California Santa Cruz. (n.d.). Security Breach Examples and Practices to Avoid Them. Retrieved December 24, 2015, from http://its.ucsc.edu/security/breaches.html
Whittaker, Z. (2015, November). These Companies Lost Your Data in 2015 's Biggest Hacks, Breaches 9 - Page 9 | ZDNet. Retrieved December 24, 2015, from

Related Documents