Cis 502

Submitted by: Submitted by

Views: 361

Words: 349

Pages: 2

Category: Business and Industry

Date Submitted: 05/23/2013 03:53 PM

Report This Essay

Strayer University

Alexandria Campus

Case Study 2: Social Engineering Attacks and Counterintelligence

CIS 502: Theories of Security Management

documents from the Iraq War where exposed some details about the “real” numbers of deaths in the Iraq War as well as cases of torture and others atrocities made by Iraqi forces and coalition forces. The Pentagon condemned the released of unauthorized disclosure of classified information saying that it puts Americans and Iraqi in danger and could hamper military operations. This is not the first time Wikileaks release classified military information. Months before, they published a raft of secret documents from Afghanistan called “ Afghan War Diary” that were obtained from a solder who had access to secret intelligence contained on military computers.

Companies are very conscious about how they are perceive by the public and how prejudicial could be for them being exposed to hackers. In times where seems that everybody is 24/7 connected to the Internet and keep the privacy is a challenge, They just can’t afford being exposed and lost the credibility and trust of their clients. It’s for that reason they invest a significantly amount of time and money developing new strategies and policies to protect themselves from any kind of attack. From screening processes to select new employes to routinely monitor computer networks and employees activities for suspicious activities, seems like in order to keep everybody’s safe we are losing a little of our right to the privacy.

In the case of the Pentagon, they had to quickly set up an entire team to review the documents for potential damage and work against the clock to ensure the protection of all the persons involve who’s names could appear published. They also had to work on find and analyze all the information that could be used by enemies forces to plan future attacks. All this before Wikileaks...