{"id":11264,"date":"2018-05-29T23:31:56","date_gmt":"2018-05-29T23:31:56","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/?post_type=chapter&#038;p=11264"},"modified":"2024-05-07T16:22:40","modified_gmt":"2024-05-07T16:22:40","slug":"reading-security-issues-in-electronic-communication","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/chapter\/reading-security-issues-in-electronic-communication\/","title":{"raw":"Security Issues in Information Technology","rendered":"Security Issues in Information Technology"},"content":{"raw":"<div id=\"collins-ch15_s06_n01\" class=\"im_learning_objectives im_editable im_block\">\r\n<div class=\"textbox learning-objectives\">\r\n<h3>Learning Outcomes<\/h3>\r\n<ul>\r\n \t<li>Identify security issues associated with information technology.<\/li>\r\n<\/ul>\r\n<\/div>\r\nNow that we have acknowledged the amount of data that business collects about people, what are the risks and challenges associated with keeping that information secure? Businesses stand to lose consumer confidence and respect if they allow unauthorized access to customer data. For this reason, businesses take information security and cyber-security seriously. Despite the importance of protecting customer data, breaches and hacks seem to be more and more common. Is this a result of inadequate\u00a0security measures on the part of the businesses, or are hackers getting better at accessing so-called \"secure networks\"? The answer is probably both. In\u00a0this section you'll learn about some of the ongoing\u00a0security issues businesses face in trying to safeguard their (and their customers')\u00a0electronic communications and data.\r\n<p class=\"im_title\">Information technology has presented businesses with opportunities undreamt of only a couple of decades ago. But it also has introduced some unprecedented challenges.<\/p>\r\nhttps:\/\/youtu.be\/MHy8gKEmE48\r\n\r\nYou can <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/HomeDepotSecurityBreach_transcript.txt\" target=\"_blank\" rel=\"noopener\">view the transcript for \"Home Depot Security Breach\" (opens in new window)<\/a>\u00a0or the <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/HomeDepotSecurityBreach_alternative.txt\" target=\"_blank\" rel=\"noopener\">text alternative for \"Home Depot Security Breach\" (opens in new window)<\/a>.\r\n\r\nIt has been estimated that businesses expend more than 5% of their annual IT budgets protecting themselves against disrupted operations and theft due to information theft. A February 2018 report by McAfee estimates that cyber-crime costs the world over $800 billion or 0.08% of global GDP. Among the reasons given for the growing cost of cyber-crime are:\r\n<ul>\r\n \t<li>Quick adoption of new technologies by cyber-criminals<\/li>\r\n \t<li>The increased number of new users online (these\u00a0tend to be from low-income countries with weak\u00a0cyber-security)<\/li>\r\n \t<li>The increased ease of committing cyber-crime, with the\u00a0growth of Cyber-crime-as-a-Service<\/li>\r\n \t<li>An expanding number of cyber-crime \u201ccenters\u201d that\u00a0now include Brazil, India, North Korea, and Vietnam<\/li>\r\n \t<li>A growing financial sophistication among top-tier\u00a0cyber criminals that, among other things, makes\u00a0monetization easier<\/li>\r\n<\/ul>\r\nAccording to the McAfee report, \"Monetization of stolen data,\u00a0which has always been a\u00a0problem for cyber-criminals,\u00a0seems to have become\r\nless difficult because of\u00a0improvements in cyber-crime\u00a0black markets and the use of\u00a0digital currencies[footnote]Lewis, James. \"Economic Impact of Cybercrime\u2014No Slowing Down.\" McAfee. January 2018. Accessed June 25, 2019. <a href=\"https:\/\/csis-prod.s3.amazonaws.com\/s3fs-public\/publication\/economic-impact-cybercrime.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/csis-prod.s3.amazonaws.com\/s3fs-public\/publication\/economic-impact-cybercrime.pdf<\/a>.[\/footnote].\" <strong>\u00a0<\/strong>\r\n\r\nCyber-crime can take on many faces from data breaches to malicious program that attack a company's network and disrupt service or corrupt sensitive corporate data. We will examine just a few of the ways that criminals are using technology to wreak havoc on business operations.\r\n\r\n<\/div>\r\n<div id=\"collins-ch15_s06_s01\" class=\"im_section\">\r\n<div id=\"collins-ch15_s06_s01_s01\" class=\"im_section\">\r\n<h2>Viruses and Malicious Programs<\/h2>\r\n<div id=\"collins-ch15_s06_s01_s01_s01\" class=\"im_section\">\r\n\r\nWith the increased use of the Internet comes an increased risk of a business's computer network being affected by malicious programs such as viruses. A computer virus is a piece of computer code that is inserted into another program and lies dormant until triggered by an unsuspecting user. This trigger can be as simple as opening a file attachment or downloading a file from the Internet. Viruses range from the playful, simply displaying an image on the users' screen meant to be funny to extreme cases where data files are permanently erased. Most companies deploy anti-virus software across their network, but even the most sophisticated anti-virus software cannot keep up with the ever growing number of viruses and malicious programs out there.\u00a0\u00a0Motives for creating viruses can include seeking\u00a0profit\u00a0(e.g., with\u00a0ransomware), desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for\u00a0sabotage\u00a0and\u00a0denial of service, or simply because hackers wish to explore\u00a0cyber-security\u00a0issues. The consequences of such viruses and malicious programs can be catastrophic, effectively destroying a company's entire network and electronic records.\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"collins-ch15_s06_s01_s02\" class=\"im_section\">\r\n<h2>Phishing<\/h2>\r\n<\/div>\r\n<\/div>\r\n<div id=\"collins-ch15_s06_s02\" class=\"im_section\">\r\n\r\nOne of the most prevalent cyber-attacks is the phishing scam.\u00a0Phishing is when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information \u2013 such as account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information to steal your money or your identity or both.\u00a0Scammers also use phishing emails to get access to your computer or network then they install programs like ransomware that can lock you out of important files on your computer.\r\n\r\nPhishing scammers lure their targets into a false sense of security by spoofing the familiar, trusted logos of established, legitimate companies. Or they pretend to be a friend or family member.\u00a0Phishing scammers make it seem like they need your information or someone else\u2019s, quickly \u2013 or something bad will happen. They might say your account will be frozen, you\u2019ll fail to get a tax refund, your boss will get mad, even that a family member will be hurt or you could be arrested. They tell lies to get to you to give them information.\r\n\r\nTo protect yourself and your company's information, the U.S. Federal Trade Commission recommends the following precautions:\r\n<ul>\r\n \t<li><b>Be cautious about opening attachments or clicking on links in emails.<\/b> Even your friend or family members\u2019 accounts could be hacked. Files and links can contain malware that can weaken your computer's security.<\/li>\r\n \t<li><b>Do your own typing. <\/b>If a company or organization you know sends you a link or phone number, don\u2019t click. Use your favorite search engine to look up the website or phone number yourself. Even though a link or phone number in an email may look like the real deal, scammers can hide the true destination.<\/li>\r\n \t<li><b>Make the call if you\u2019re not sure.<\/b> Do not respond to any emails that request personal or financial information. Phishers use pressure tactics and prey on fear. If you think a company, friend or family member really does need personal information from you, pick up the phone and call them yourself using the number on their website or in your address book, not the one in the email.<\/li>\r\n \t<li><b>Turn on two-factor authentication.<\/b> For accounts that support it, two-factor authentication requires both your password and an additional piece of information to log in to your account. The second piece could be a code sent to your phone, or a random number generated by an app or a token. This protects your account even if your password is compromised.<\/li>\r\n \t<li><b>Back up your files to an external hard drive or cloud storage.<\/b> Back up your files regularly to protect yourself against viruses or a ransomware attack.<\/li>\r\n \t<li><b>Keep your security up to date.<\/b> Use security software you trust, and make sure you set it to update automatically.<\/li>\r\n<\/ul>\r\nEven with these precautions in place, highly sophisticated phishing scams are successful in achieving their goal. The following 2018 statistics from Dashlane <strong>(SOURCE:\u00a0https:\/\/blog.dashlane.com\/phishing-statistics\/)<\/strong>\u00a0 illustrate just how prolific phishing attacks are:\r\n<ul>\r\n \t<li>According to\u00a0<a href=\"https:\/\/phishme.com\/wp-content\/uploads\/2017\/11\/Enterprise-Phishing-Resiliency-and-Defense-Report-2017.pdf\" target=\"_blank\" rel=\"noopener\">PhishMe\u2019s Enterprise Phishing Resiliency and Defense Report<\/a>, phishing attempts have grown 65% in the last year.<\/li>\r\n \t<li>According to\u00a0<a href=\"https:\/\/info.wombatsecurity.com\/state-of-the-phish\" target=\"_blank\" rel=\"noopener\">Wombat Security State of the Phish<\/a>, 76% of businesses reported being a victim of a phishing attack in the last year.<\/li>\r\n \t<li>According to the\u00a0<a href=\"http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/2017\/\" target=\"_blank\" rel=\"noopener\">Verizon Data Breach Investigations Report<\/a>, 30% of phishing messages get opened by targeted users and 12% of those users click on the malicious attachment or link.<\/li>\r\n \t<li>According to the\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/2164139\/network-security\/how-to-blunt-spear-phishing-attacks.html\" target=\"_blank\" rel=\"noopener\">SANS Institute<\/a>, 95% of all attacks on enterprise networks are the result of successful spear phishing.<\/li>\r\n \t<li><a href=\"https:\/\/www.symantec.com\/connect\/blogs\/latest-intelligence-june-2017\" target=\"_blank\" rel=\"noopener\">According to\u00a0Symantec, phishing rates have increased<\/a> across most industries and organization sizes \u2014 no company or vertical is immune.<\/li>\r\n \t<li>According to the\u00a0<a href=\"https:\/\/www.webroot.com\/us\/en\/about\/press-room\/releases\/nearly-15-million-new-phishing-siteshttps:\/\/www.webroot.com\/us\/en\/about\/press-room\/releases\/nearly-15-million-new-phishing-sites\" target=\"_blank\" rel=\"noopener\">Webroot Threat Report<\/a>, nearly 1.5 million new phishing sites are created each month.<\/li>\r\n<\/ul>\r\nAnother way that cyber-criminals interrupt business operations is through DoS (Denial of Service attacks).\r\n<div id=\"collins-ch15_s06_s02_s01\" class=\"im_section\">\r\n<h2 class=\"im_title im_editable im_block\">Denial of Service<\/h2>\r\nA denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. Services affected may include email, websites, online accounts (e.g., banking), or other services that rely on the affected computer or network. A denial-of-service is accomplished by flooding the targeted host or network with traffic until the target cannot respond or simply crashes, preventing access for legitimate users. DoS attacks can cost an organization both time and money while their resources and services are inaccessible.\u00a0In 2012, not one, not two, but a whopping\u00a0six U.S. banks were targeted by a string of DoS attacks. The victims were no small-town banks either: They included Bank of America, JP Morgan Chase, U.S. Bancorp, Citigroup and PNC Bank.\r\n\r\nThese are just a few of the security issues associated with information technology. Such risks illustrate the need for increased\u00a0cybersecurity to\u00a0protect computer systems\u00a0from theft or damage to their\u00a0hardware,\u00a0software\u00a0or\u00a0electronic data, as well as from\u00a0disruption\u00a0or\u00a0misdirection\u00a0of the services they provide.\u00a0The field is of growing importance due to increasing reliance on computer systems, the\u00a0Internet\u00a0and\u00a0wireless networks\u00a0such as\u00a0Bluetooth\u00a0and\u00a0Wi-Fi, and due to the growth of\u00a0\"smart\" devices, including\u00a0smartphones,\u00a0televisions\u00a0and the various devices that constitute the\u00a0Internet of Things. Due to its complexity, both in terms of politics and technology, it is one of the major challenges of the contemporary world.\r\n<div class=\"textbox tryit\">\r\n<h3>Practice Question<\/h3>\r\nhttps:\/\/assess.lumenlearning.com\/practice\/a07bf43b-ad65-49e4-95c7-fd184a6ff9dc\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>","rendered":"<div id=\"collins-ch15_s06_n01\" class=\"im_learning_objectives im_editable im_block\">\n<div class=\"textbox learning-objectives\">\n<h3>Learning Outcomes<\/h3>\n<ul>\n<li>Identify security issues associated with information technology.<\/li>\n<\/ul>\n<\/div>\n<p>Now that we have acknowledged the amount of data that business collects about people, what are the risks and challenges associated with keeping that information secure? Businesses stand to lose consumer confidence and respect if they allow unauthorized access to customer data. For this reason, businesses take information security and cyber-security seriously. Despite the importance of protecting customer data, breaches and hacks seem to be more and more common. Is this a result of inadequate\u00a0security measures on the part of the businesses, or are hackers getting better at accessing so-called &#8220;secure networks&#8221;? The answer is probably both. In\u00a0this section you&#8217;ll learn about some of the ongoing\u00a0security issues businesses face in trying to safeguard their (and their customers&#8217;)\u00a0electronic communications and data.<\/p>\n<p class=\"im_title\">Information technology has presented businesses with opportunities undreamt of only a couple of decades ago. But it also has introduced some unprecedented challenges.<\/p>\n<p><iframe loading=\"lazy\" id=\"oembed-1\" title=\"Home Depot Security Breach\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/MHy8gKEmE48?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>You can <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/HomeDepotSecurityBreach_transcript.txt\" target=\"_blank\" rel=\"noopener\">view the transcript for &#8220;Home Depot Security Breach&#8221; (opens in new window)<\/a>\u00a0or the <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/HomeDepotSecurityBreach_alternative.txt\" target=\"_blank\" rel=\"noopener\">text alternative for &#8220;Home Depot Security Breach&#8221; (opens in new window)<\/a>.<\/p>\n<p>It has been estimated that businesses expend more than 5% of their annual IT budgets protecting themselves against disrupted operations and theft due to information theft. A February 2018 report by McAfee estimates that cyber-crime costs the world over $800 billion or 0.08% of global GDP. Among the reasons given for the growing cost of cyber-crime are:<\/p>\n<ul>\n<li>Quick adoption of new technologies by cyber-criminals<\/li>\n<li>The increased number of new users online (these\u00a0tend to be from low-income countries with weak\u00a0cyber-security)<\/li>\n<li>The increased ease of committing cyber-crime, with the\u00a0growth of Cyber-crime-as-a-Service<\/li>\n<li>An expanding number of cyber-crime \u201ccenters\u201d that\u00a0now include Brazil, India, North Korea, and Vietnam<\/li>\n<li>A growing financial sophistication among top-tier\u00a0cyber criminals that, among other things, makes\u00a0monetization easier<\/li>\n<\/ul>\n<p>According to the McAfee report, &#8220;Monetization of stolen data,\u00a0which has always been a\u00a0problem for cyber-criminals,\u00a0seems to have become<br \/>\nless difficult because of\u00a0improvements in cyber-crime\u00a0black markets and the use of\u00a0digital currencies<a class=\"footnote\" title=\"Lewis, James. &quot;Economic Impact of Cybercrime\u2014No Slowing Down.&quot; McAfee. January 2018. Accessed June 25, 2019. https:\/\/csis-prod.s3.amazonaws.com\/s3fs-public\/publication\/economic-impact-cybercrime.pdf.\" id=\"return-footnote-11264-1\" href=\"#footnote-11264-1\" aria-label=\"Footnote 1\"><sup class=\"footnote\">[1]<\/sup><\/a>.&#8221; <strong>\u00a0<\/strong><\/p>\n<p>Cyber-crime can take on many faces from data breaches to malicious program that attack a company&#8217;s network and disrupt service or corrupt sensitive corporate data. We will examine just a few of the ways that criminals are using technology to wreak havoc on business operations.<\/p>\n<\/div>\n<div id=\"collins-ch15_s06_s01\" class=\"im_section\">\n<div id=\"collins-ch15_s06_s01_s01\" class=\"im_section\">\n<h2>Viruses and Malicious Programs<\/h2>\n<div id=\"collins-ch15_s06_s01_s01_s01\" class=\"im_section\">\n<p>With the increased use of the Internet comes an increased risk of a business&#8217;s computer network being affected by malicious programs such as viruses. A computer virus is a piece of computer code that is inserted into another program and lies dormant until triggered by an unsuspecting user. This trigger can be as simple as opening a file attachment or downloading a file from the Internet. Viruses range from the playful, simply displaying an image on the users&#8217; screen meant to be funny to extreme cases where data files are permanently erased. Most companies deploy anti-virus software across their network, but even the most sophisticated anti-virus software cannot keep up with the ever growing number of viruses and malicious programs out there.\u00a0\u00a0Motives for creating viruses can include seeking\u00a0profit\u00a0(e.g., with\u00a0ransomware), desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for\u00a0sabotage\u00a0and\u00a0denial of service, or simply because hackers wish to explore\u00a0cyber-security\u00a0issues. The consequences of such viruses and malicious programs can be catastrophic, effectively destroying a company&#8217;s entire network and electronic records.<\/p>\n<\/div>\n<\/div>\n<div id=\"collins-ch15_s06_s01_s02\" class=\"im_section\">\n<h2>Phishing<\/h2>\n<\/div>\n<\/div>\n<div id=\"collins-ch15_s06_s02\" class=\"im_section\">\n<p>One of the most prevalent cyber-attacks is the phishing scam.\u00a0Phishing is when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information \u2013 such as account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information to steal your money or your identity or both.\u00a0Scammers also use phishing emails to get access to your computer or network then they install programs like ransomware that can lock you out of important files on your computer.<\/p>\n<p>Phishing scammers lure their targets into a false sense of security by spoofing the familiar, trusted logos of established, legitimate companies. Or they pretend to be a friend or family member.\u00a0Phishing scammers make it seem like they need your information or someone else\u2019s, quickly \u2013 or something bad will happen. They might say your account will be frozen, you\u2019ll fail to get a tax refund, your boss will get mad, even that a family member will be hurt or you could be arrested. They tell lies to get to you to give them information.<\/p>\n<p>To protect yourself and your company&#8217;s information, the U.S. Federal Trade Commission recommends the following precautions:<\/p>\n<ul>\n<li><b>Be cautious about opening attachments or clicking on links in emails.<\/b> Even your friend or family members\u2019 accounts could be hacked. Files and links can contain malware that can weaken your computer&#8217;s security.<\/li>\n<li><b>Do your own typing. <\/b>If a company or organization you know sends you a link or phone number, don\u2019t click. Use your favorite search engine to look up the website or phone number yourself. Even though a link or phone number in an email may look like the real deal, scammers can hide the true destination.<\/li>\n<li><b>Make the call if you\u2019re not sure.<\/b> Do not respond to any emails that request personal or financial information. Phishers use pressure tactics and prey on fear. If you think a company, friend or family member really does need personal information from you, pick up the phone and call them yourself using the number on their website or in your address book, not the one in the email.<\/li>\n<li><b>Turn on two-factor authentication.<\/b> For accounts that support it, two-factor authentication requires both your password and an additional piece of information to log in to your account. The second piece could be a code sent to your phone, or a random number generated by an app or a token. This protects your account even if your password is compromised.<\/li>\n<li><b>Back up your files to an external hard drive or cloud storage.<\/b> Back up your files regularly to protect yourself against viruses or a ransomware attack.<\/li>\n<li><b>Keep your security up to date.<\/b> Use security software you trust, and make sure you set it to update automatically.<\/li>\n<\/ul>\n<p>Even with these precautions in place, highly sophisticated phishing scams are successful in achieving their goal. The following 2018 statistics from Dashlane <strong>(SOURCE:\u00a0https:\/\/blog.dashlane.com\/phishing-statistics\/)<\/strong>\u00a0 illustrate just how prolific phishing attacks are:<\/p>\n<ul>\n<li>According to\u00a0<a href=\"https:\/\/phishme.com\/wp-content\/uploads\/2017\/11\/Enterprise-Phishing-Resiliency-and-Defense-Report-2017.pdf\" target=\"_blank\" rel=\"noopener\">PhishMe\u2019s Enterprise Phishing Resiliency and Defense Report<\/a>, phishing attempts have grown 65% in the last year.<\/li>\n<li>According to\u00a0<a href=\"https:\/\/info.wombatsecurity.com\/state-of-the-phish\" target=\"_blank\" rel=\"noopener\">Wombat Security State of the Phish<\/a>, 76% of businesses reported being a victim of a phishing attack in the last year.<\/li>\n<li>According to the\u00a0<a href=\"http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/2017\/\" target=\"_blank\" rel=\"noopener\">Verizon Data Breach Investigations Report<\/a>, 30% of phishing messages get opened by targeted users and 12% of those users click on the malicious attachment or link.<\/li>\n<li>According to the\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/2164139\/network-security\/how-to-blunt-spear-phishing-attacks.html\" target=\"_blank\" rel=\"noopener\">SANS Institute<\/a>, 95% of all attacks on enterprise networks are the result of successful spear phishing.<\/li>\n<li><a href=\"https:\/\/www.symantec.com\/connect\/blogs\/latest-intelligence-june-2017\" target=\"_blank\" rel=\"noopener\">According to\u00a0Symantec, phishing rates have increased<\/a> across most industries and organization sizes \u2014 no company or vertical is immune.<\/li>\n<li>According to the\u00a0<a href=\"https:\/\/www.webroot.com\/us\/en\/about\/press-room\/releases\/nearly-15-million-new-phishing-siteshttps:\/\/www.webroot.com\/us\/en\/about\/press-room\/releases\/nearly-15-million-new-phishing-sites\" target=\"_blank\" rel=\"noopener\">Webroot Threat Report<\/a>, nearly 1.5 million new phishing sites are created each month.<\/li>\n<\/ul>\n<p>Another way that cyber-criminals interrupt business operations is through DoS (Denial of Service attacks).<\/p>\n<div id=\"collins-ch15_s06_s02_s01\" class=\"im_section\">\n<h2 class=\"im_title im_editable im_block\">Denial of Service<\/h2>\n<p>A denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. Services affected may include email, websites, online accounts (e.g., banking), or other services that rely on the affected computer or network. A denial-of-service is accomplished by flooding the targeted host or network with traffic until the target cannot respond or simply crashes, preventing access for legitimate users. DoS attacks can cost an organization both time and money while their resources and services are inaccessible.\u00a0In 2012, not one, not two, but a whopping\u00a0six U.S. banks were targeted by a string of DoS attacks. The victims were no small-town banks either: They included Bank of America, JP Morgan Chase, U.S. Bancorp, Citigroup and PNC Bank.<\/p>\n<p>These are just a few of the security issues associated with information technology. Such risks illustrate the need for increased\u00a0cybersecurity to\u00a0protect computer systems\u00a0from theft or damage to their\u00a0hardware,\u00a0software\u00a0or\u00a0electronic data, as well as from\u00a0disruption\u00a0or\u00a0misdirection\u00a0of the services they provide.\u00a0The field is of growing importance due to increasing reliance on computer systems, the\u00a0Internet\u00a0and\u00a0wireless networks\u00a0such as\u00a0Bluetooth\u00a0and\u00a0Wi-Fi, and due to the growth of\u00a0&#8220;smart&#8221; devices, including\u00a0smartphones,\u00a0televisions\u00a0and the various devices that constitute the\u00a0Internet of Things. Due to its complexity, both in terms of politics and technology, it is one of the major challenges of the contemporary world.<\/p>\n<div class=\"textbox tryit\">\n<h3>Practice Question<\/h3>\n<p>\t<iframe id=\"assessment_practice_a07bf43b-ad65-49e4-95c7-fd184a6ff9dc\" class=\"resizable\" src=\"https:\/\/assess.lumenlearning.com\/practice\/a07bf43b-ad65-49e4-95c7-fd184a6ff9dc?iframe_resize_id=assessment_practice_id_a07bf43b-ad65-49e4-95c7-fd184a6ff9dc\" frameborder=\"0\" style=\"border:none;width:100%;height:100%;min-height:300px;\"><br \/>\n\t<\/iframe><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-11264\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Original<\/div><ul class=\"citation-list\"><li>Security Issues in Information Technology. <strong>Authored by<\/strong>: Linda Williams. <strong>Provided by<\/strong>: Lumen Learning. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Home Depot Security Breach. <strong>Provided by<\/strong>: BBC. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/youtu.be\/MHy8gKEmE48\">https:\/\/youtu.be\/MHy8gKEmE48<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/\">CC BY-NC-ND: Attribution-NonCommercial-NoDerivatives <\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section><hr class=\"before-footnotes clear\" \/><div class=\"footnotes\"><ol><li id=\"footnote-11264-1\">Lewis, James. \"Economic Impact of Cybercrime\u2014No Slowing Down.\" McAfee. January 2018. Accessed June 25, 2019. <a href=\"https:\/\/csis-prod.s3.amazonaws.com\/s3fs-public\/publication\/economic-impact-cybercrime.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/csis-prod.s3.amazonaws.com\/s3fs-public\/publication\/economic-impact-cybercrime.pdf<\/a>. <a href=\"#return-footnote-11264-1\" class=\"return-footnote\" aria-label=\"Return to footnote 1\">&crarr;<\/a><\/li><\/ol><\/div>","protected":false},"author":163,"menu_order":16,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc\",\"description\":\"Home Depot Security Breach\",\"author\":\"\",\"organization\":\"BBC\",\"url\":\"https:\/\/youtu.be\/MHy8gKEmE48\",\"project\":\"\",\"license\":\"cc-by-nc-nd\",\"license_terms\":\"\"},{\"type\":\"original\",\"description\":\"Security Issues in Information Technology\",\"author\":\"Linda Williams\",\"organization\":\"Lumen Learning\",\"url\":\"\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"96b7bd66-1836-4e06-85f4-a1ce5851abc7, 87a70611-0f2b-415b-9adf-29f4549691df","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-11264","chapter","type-chapter","status-publish","hentry"],"part":11240,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/users\/163"}],"version-history":[{"count":23,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11264\/revisions"}],"predecessor-version":[{"id":15453,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11264\/revisions\/15453"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/parts\/11240"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11264\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/media?parent=11264"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapter-type?post=11264"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/contributor?post=11264"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/license?post=11264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}