Winter's Tale Publishing Case Summary

Improved Essays
Winter’s Tale Publishing; a Hack job The case centers around the liabilities in which poor management can expose a company as well as the side effects that a cyber-intruder can have on a business' operations. Secondary issues explored include, auditing the company’s framework to evaluate their internal control structure, designing a secure IT network for start-up businesses, and address their legal and marketing worries if the organization were to be hacked.
The Winter's Tale Publishing case describes, a startup publishing house started by Mr. John Winters; after he successfully publishing his own book. The company grew quickly, but failed to ensure several pertinent areas were up to industry standards. These failures would later manifest themselves in a huge way. Winter's Tale started out by building interest in a soon-to-be-published tell-all book. With all of the debate centered on the publishing of this controversial book, Winter's Tale's servers were hacked. The hackers accessed personal
…show more content…
They can also create audio books for people who are on the move and find it difficult to read from a traditional book or even a digital copy. The company must channel their energy into cybersecurity for the future and not focuses on incidents and how to deal with them after the fact. But focus their concerns on prevention with an investment in a better cybersecurity system. Their action is surprising in a world where there is a continued battle between hackers and various societal actors attempting to protect their systems. Cybersecurity is said to be the new form of war and is viewed as the next platform in modern warfare (Bruijn & Janssen, 2017). Given its importance, why is there so little awareness? And why are we not taking more drastic measures to protect our

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The first being the security of personally identifiable information. Now in this instance the company itself is not fully responsible for this release but they are indirectly responsible. The hackers are directly responsible for the dissemination of the users personal data but the company could have avoided this incident by shutting down but chose not to which directly constitutes a breach of privacy and security proposed by the company to protect the users information. The next issue is the release of users information that paid the company the fee of $19 to delete their information. The company decided not to delete the users information for some reason from their servers.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    Target Executive Summary

    • 343 Words
    • 2 Pages

    In December 2013, criminals forced their way into systems, gaining access to guest credit and debit card information. It was determined that certain guest information was also taken, for example, the information included names, mailing addresses, email addresses or phone numbers. The massive data breaches at Target were broken into the retailer's network using login credentials stolen from a heating, ventilation and air conditioning company. The hackers first tested the data-stealing malware on a small number of cash registers. The cost of the breach was far reaching to Target, customers, employees and banks.…

    • 343 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    According to a report by USA Today’s Elizabeth Weise, an astounding 43% of businesses had been hacked in 2014 and they don’t seem to be slowing down (Weise, 2014). It is important to expand further on the Target store breach of 2013.…

    • 946 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Wolftech Case

    • 1032 Words
    • 5 Pages

    The Woftech is the company their business energy sector they have many business branches in UK, central Europe and china their main office is located in Wolverhampton there are 85 employees working in their business. Their currently facing problems with IT security provision and business continuity their company using operating system such as Windows 7 and Windows XP senior staff using mobile and iPads to access to email their website is hosted by external hosting company. Threats The threats is human error or malicious that can be internal or external that impacts organization security this will happen in organization due poor planning, lack of policies and the lack of IT security the threats we can divide into to accidental and deliberate the…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Data Breaches In Research

    • 1346 Words
    • 6 Pages

    Types of data breaches Safeguarding and securing information is an important aspect of business that allows for preventing and minimizing risks. With data breach or incidents in which information is compromised, both businesses and consumers are greatly impacted, due to adverse consequences that may follow. The globalization of today’s economy is dependent upon electronic access via the internet, email, and “other components of “cyberspace,” including the global consumer credit card payment networks. Different types of informational or data breaches that significantly affect business functions involve compromise of financial data, customer’s private information, and business proprietary data. Data breaches totaled 1,540 worldwide in 2014…

    • 1346 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Small Security Breach

    • 556 Words
    • 3 Pages

    The divulgence of a small business’s secrets is one of the worst things imaginable. Unfortunately, data security breaches are happening more often. “But I have a small business,” you’re thinking. “No one would take the time to hack into my systems and steal my information.”…

    • 556 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    Items like these accounts being accessed at the same time from different IP addresses really should have been a “RED FLAG” of major ongoing issues. Furthermore, he had been an IT manager for two years and had he not been receiving reports of leaving personnel to allow him to have their accounts properly deleted in…

    • 884 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays