IT-304 Current event

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

304

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by ElderHeronMaster1052

Report
IT-304: Systems Requirements/Implement Plan 4-2 Activity: Current Event Professor: Logan Ella Ali February 29, 2024
For this assignment, the recent event that I have selected ensures that it is relevant to this class due to the system implementation and requirements. On August 17 th T-Mobile confirmed that the organizations systems were subjected to a criminal cyberattacked that compromised data of millions of customers, prospects, and former customers. The breach did not expose any customer financial information, but it did compromise customer’s sensitive information such as SSN, address, date of birth and driver’s license/ID information. Attacks like this are on the rise where actors work every day to find a new avenue to attack a system and exploit it. The ethical decision that was make by T-Mobile was to inform all of those potential customers that might be have been exposed and offer two years of free identity protection services paid by T-Mobile, offered scam-blocking protection and suggest password resets for all customers. I believe that a breach is one of the worst things that can happen to an organization or its customers. Due to the breach, the criminal could engage in all types of fraud from opening a credit card under an individual’s name to impersonating the individuals. All of these could result in legal issues, impact on credit and financial loss. On the other hand, the company would face financial loss, revenue loss, damage reputation and legal consequences. If I was the IT professional involved with this event, first I would have implemented a system to track back the information exposed/lost. Also, allocate more resources and funding to the IT department to ensure better quality protection because majority of events such as
these takes place when the organization doesn’t allocate more funds for a team to consistently improve systems/hardware. This concept is relevant to this course because of the invasion of privacy that occurs after a breach. It is critical for a company to implement systems/software/hardware that could protect the consumer privacy which would increase the cost of the IT department. However, organization should foresee the benefits of having a strong system that can’t be breach. this would increase consumer confidence, loyalty in the company.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Citation Sievert, M. (2021, August 27). The cyberattack against T-Mobile and our customers: What happened, and what we are doing about it. - T-mobile newsroom . T. https://www.t- mobile.com/news/network/cyberattack-against-tmobile-and-our-customers