How large was breach and how long it take to find problem


Discussion Board

i. Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals (Needs 200 words).

ii. Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more). In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

iii. Describe some ways that an organization can recover it's IT resources from a disaster. What controls should have been in place in order to be able to retrieve this data?

The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.

Request for Solution File

Ask an Expert for Answer!!
Other Subject: How large was breach and how long it take to find problem
Reference No:- TGS03047678

Expected delivery within 24 Hours