Question.2330 - Course Objective: CO6: Diagnose cyber vulnerabilities of systems that support an organization's supply chain. Prompt: Research recent cyber breaches that have occurred with different companies. Select a company that had a cyber breach and consider what happened and what could have been done differently (examples include Sony, Maersk, Saks, Lord & Taylor, Sacramento Bee, TicketFly, Panera, Facebook, Target, Under Armour, and Equifax). Given that cyber breaches are more common, write about the importance of cyber defenses and organizational hardening for an organization's supply chain. In your paper, consider the government requirements that are currently in place and how this might apply to commercial organizations. Consider using the outline below to better focus your paper on this complex topic: I. Introduction II. Review and discuss the organization that had a cyber breach. III. Explain the importance of cyber defenses as it related to the cyber breach under discussion. IV. Discuss the applicable government requirements. V. Conclusion
Answer Below:
Data xxxxxxxx are xxxxxxx common xxxx more xxxxxxxxxxxx evolving xxx hackers xxxxxx advantage xx them xxxxxxxxxxxxx with xxxxx volumes xx data xxx exposed xx such xxxx breaches xxxxxxx they xxxx valuable xxx sensitive xxxx that xxxxxxx hackers xx amp x is xxx of xxx organizations xxxx has xxxxxxxxxx fallen xxxx to xxxxx breaches xxxx paper xxxxxxxx the xxxxxxxxxx of xxx breach xxxxx defense xxxxxxxx and xxxxxxxxxxxx regulations xx address xxx same xxxxxx of xxxxxxxx amp x is xx American xxxxxxxxxxxxx telecommunications xxxxxxx that xxxxxxxx mobile xxx fixed-line xxxxxxxxx services xxxxxxxx services xxx television xxxxxxxx The xxxxxxx was xxxxxxx in xxx is xxxxxxxxxxxxx in xxxxxx Texas xxxx over xxxxxxxxx and xxxxxxxxxx in xxxx than xxxxxxxxx AT xxx T xx one xx the xxxxxxx telecommunications xxxxxxxxx in xxx world xxxxxxxx AT xxx T xxxxxxxxxxx a xxxxx breach xxxx resulted xx the xxxxxxxx of xxxxxxxxx customer xxxxxxxxxxx Biccherai xxx breach xxx caused xx a xxxxxxxxxxxxx phishing xxxxxx that xxxxxxxx AT xxx T xxxxxxxxx The xxxxxxxxx were xxxx to xxxx access xx the xxxxxxx s xxxxxxx and xxxxx personal xxxxxxxxxxx such xx names xxxxxxxxx and xxxxxx Security xxxxxxx of xx amp x customers xxxx is xxx the xxxxx time xxxx AT xxx T xxx experienced x cyber xxxxxx In xxx company xxxxxxxx a xxxx breach xxxx exposed xxx personal xxxxxxxxxxx of xxxx customers xxx breach xxx caused xx an xxxxxxxxxxxx third-party xxx gained xxxxxx to xx amp x s xxxxxxxx service xxxxxx The xxxxxxxx resulted xx a xxxxxxx settlement xxxxxxx AT xxx T xxx the xxxxxxx Communications xxxxxxxxxx In xxxxxxxx to xxx breach xx amp x has xxxx experienced xxxxx cyber xxxxxxxxx in xxx past xx the xxxxxxx suffered x data xxxxxx that xxxxxxx the xxxxxxxx information xx over xxxxxxxxx The xxxxxx was xxxxxx by x contractor xxx accessed xxxxxxxxxx amp x CYBER xxxxxx records xxxxxxx authorization xx the xxxxxxx suffered x breach xxxx exposed xxx personal xxxxxxxxxxx of xxxx employees xxx breach xxx caused xx an xxxxxxxxxxxx third-party xxx gained xxxxxx to xx amp x s xxxxxxx Biccherai xx prevent xxxxxx breaches xx amp x could xxxx taken xxxxxxxxxx measures xx improve xxx cybersecurity xxxxxxx One xxxxxxxxx area xxxxx the xxxxxxx could xxxx improved xxx security xxxxxxxx is xxxxxxxx training xxxxxxxxx employees xxxx more xxxxxxxxx training xx how xx identify xxx avoid xxxxxxxx attempts xxxxx help xx preventing xxxxx attacks xxxxxxxxxxxx AT xxx T xxxxx have xxxxxxxxxxx more xxxxxx network xxxxxxxxxxxx to xxxxx the xxxxxx of xxx future xxxxxxxx and xxxxxxx attackers xxxx gaining xxxxxx to xxxxxxxxx customer xxxx Importance xx Cyber xxxxxxxxxx today x interconnected xxxxx organizations xxxx heavily xx their xxxxxx chains xx deliver xxxxxxxx and xxxxxxxx to xxxxx customers xxxxxxx this xxxxxxxxx reliance xx supply xxxxxx also xxxxx organizations xxxx vulnerable xx cyber xxxxxxx A xxxxx breach xx one xxxx of xxx supply xxxxx can xxxxxxx spread xx other xxxxx causing xxxxxxxxxxx disruption xxx damage xx protect xxxxxxx cyber xxxxxxx organizations xxxx implement xxxxxx cyber xxxxxxxx This xxxxxxxx measures xxxx as xxxxxxxxx intrusion xxxxxxxxx systems xxx encryption xx Small xxxxxxxx Administration xxxxx measures xxxx to xxxxxxx the xxxxxxxxxxxx s xxxxxxx and xxxx from xxxxxxxxxxxx access xxx mitigate xxx risk xx cyber xxxxxxxx Organizations xxxx also xxxxxx that xxxxx employees xxx trained xx identify xxx respond xx cyber xxxxxxx such xx phishing xxx social xxxxxxxxxxx attacks xx addition xx implementing xxxxxx cyber xxxxxxxx organizations xxxx also xxxxx on xxxxxxxxxxxxxx hardening xx protect xxxxx supply xxxxxx Organizational xxxxxxxxx involves xxxxxxxxxxxx policies xxx procedures xxxx ensure xxx security xx the xxxxxxxxxxxx s xxxxxxxx amp x CYBER xxxxxx chain xxxx can xxxxxxx measures xxxx as xxxxxxx security xxxxxx supply xxxxx risk xxxxxxxxxxx and xxxxxx management xxxxxxxx US xxxxx Business xxxxxxxxxxxxxx By xxxxxxxxxxxx these xxxxxxxx organizations xxx ensure xxxx their xxxxxx chain xxxxxxxx are xxxx taking xxxxxxxxxxx steps xx protect xxxxxxx cyber xxxxxxx The xxxxxxxxxx of xxxxx defenses xxx organizational xxxxxxxxx for xxxxxx chain xxxxxxx is xxxxxxx in xxx case xx AT xxx T xxx company x recent xxxxx breach xxxxxxxx not xxxx its xxxxxxxxx but xxxx its xxxxxx chain xxxxxxxx The xxxxxx highlights xxx importance xx having xxxxxx cybersecurity xxxxxxxx in xxxxx to xxxxxxx against xxxxxxx AT xxx T xxxxx have xxxxxxxxxxx more xxxxxx cybersecurity xxxxxxxx and xxxxxxxxxxxxxx hardening xx mitigate xxx impact xx the xxxxxx on xxx supply xxxxx partners xxxx could xxxx included xxxxxxxx such xx increased xxxxxxxx training xx cyber xxxxxxx regular xxxxxxxx audits xx its xxxxxx chain xxxxxxxx and xxxx stringent xxxxxx management xxxxxxxx Government xxxxxxxxxxxxxxx United xxxxxx government xxx implemented xxxxxxx requirements xx improve xxxxxxxxxxxxx and xxxxxxx against xxxxx threats xxxxx requirements xxxxx to xxxxxxxxxx agencies xxx contractors xxxx work xxxx the xxxxxxxxxx However xxxx also xxxx implications xxx commercial xxxxxxxxxxxxx that xxxxxxx products xxx services xx the xxxxxxxxxx or xxxx with xxxxxxxxxx contractors xxx of xxx key xxxxxxxxxxxx is xxx Federal xxxxxxxxxxx Security xxxxxxxxxxxxx Act xxxxx FISMA xxxxxxxx federal xxxxxxxx to xxxxxxx implement xxx maintain xxxxxxxxxxxxx programs xx protect xxxxx information xxx information xxxxxxx Cybersecurity xxx infrastructure xxxxxxxx agency xxxxx also xxxxxxxx federal xxxxxxxx to xxxxxx on xxxxx cybersecurity xxxxxxx and xxxxxx risk xxxxxxxxxxx to xxxxxxxx CommercialAT xxx T xxxxx BREACH xxxxxxxxxxxxx that xxxx with xxxxxxx agencies xxxx comply xxxx FISMA xxxxxxxxxxxx and xxxxxx that xxxxx products xxx services xxxx the xxxxxxxxx cybersecurity xxxxxxxxx Another xxx requirement xx the xxxxxxxx Institute xx Standards xxx Technology xxxx Cybersecurity xxxxxxxxx The xxxx Cybersecurity xxxxxxxxx provides x set xx guidelines xxx best xxxxxxxxx for xxxxxxxxxxxxx to xxxxxx and xxxxxx cybersecurity xxxx The xxxxxxxxx includes xxxx core xxxxxxxxx identify xxxxxxx detect xxxxxxx and xxxxxxx Commercial xxxxxxxxxxxxx can xxx the xxxx Cybersecurity xxxxxxxxx to xxxxxxx their xxx cybersecurity xxxxxxxx and xxxxxx that xxxx are xxxxxxx with xxxxxxxxxx requirements xx addition xx FISMA xxx the xxxx Cybersecurity xxxxxxxxx there xxx other xxxxxxxxxx requirements xxxx commercial xxxxxxxxxxxxx should xx aware xx These xxxxxxx the xxxxxxx Federal xxxxxxxxxxx Regulation xxxxxxxxxx DFARS xxxxx requires xxxxxxxxxxx to xxxxxxxxx adequate xxxxxxxxxxxxx measures xx protect xxxxxxxxxx information xxxxx The xxxxxxx Data xxxxxxxxxx Regulation xxxx also xxx implications xxx US-based xxxxxxxxx that xx business xxxx European xxxxx organizations xxxxxxxxxx organizations xxxx work xxxx the xxxxxxxxxx or xxxxxxxxxx contractors xxxx comply xxxx these xxxxxxxxxxxx to xxxxxx the xxxxxxxx of xxxxxxxxxx information xxx systems xxxxxxx even xxxxxxxxxxxxx that xx not xxxx with xxx government xxx benefit xxxx implementing xxxxx requirements xx implementing xxxxxx cybersecurity xxxxxxxx and xxxxxxxxx with xxxxxxxxxx requirements xxxxxxxxxxxxx can xxxxxxx their xxxxxxxxxxxxx posture xxx protect xxxxxxx cyber xxxxxxx ConclusionAT xxx T xx only xxx of xxx thousands xx organizations xxxxxxx to xxxxx breaches xxxxx it x becoming xxxxxxxxx for xxx government xx tighten xxxxxxxx and xxxx encourage xxxxxxxxxxxxx to xxxxxxxxxx improve xxxxx defense xxxxxxxx to xxxxxxx data xxx maximize xxxxxxxxxxxxxxx and xxxxxxx AT xxx T xxxxx BREACH xxxxxxxxxxxxxxxxxxxx LF xxxxxxx are xxxxxxxx into xx amp x email xxxxxxxx to xxxxx cryptocurrency xxxxxxxxx from xxxxx techcrunch xxx hackers-are- xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Cybersecurity xxx infrastructure xxxxxxxx agency xxxxxxx information xxxxxxxx modernization xxx Retrieved xxxx https xxx cisa xxx topics xxxxxxxxxxxxxxxxxx advisories xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx DFARS xxxxxxxxxxxxx Retrieved xxxx https xxx acq xxx mil xxxx dars xxxxx html xxxxxxx htm xx Small xxxxxxxx Administration xxxxxxxxxx your xxxxxxxxxxxxx Retrieved xxxx https xxx sba xxx business-guide xxxxxxxxxxxxxxxxxxxx strengthen-your- xxxxxxxxxxxxxMore Articles From Management