Enterprise Risk Management Post Solar Winds Hack

Along with the rising demand for companies to facilitate business functions more efficiently, information technology has increasingly become a vehicle to bring about the convenience and efficiency that companies require to promote effective business operations. With such reliance upon information te...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of business and applied social science 2021-09, p.13-19
Hauptverfasser: Lamar, Dr. Shetia C. Butler, Kuralt, Michelle, Zidor-Guerrier, Carolyn
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 19
container_issue
container_start_page 13
container_title International journal of business and applied social science
container_volume
creator Lamar, Dr. Shetia C. Butler
Kuralt, Michelle
Zidor-Guerrier, Carolyn
description Along with the rising demand for companies to facilitate business functions more efficiently, information technology has increasingly become a vehicle to bring about the convenience and efficiency that companies require to promote effective business operations. With such reliance upon information technology solutions comes the potential for companies to become more vulnerable to possible security incidents with their increased reliance upon third-party vendors for software solutions. This paper seeks to explore the software company SolarWinds and analyze its 2020 security breach. This paper will discuss how the SolarWinds breach occurred, how IT Security Professionals perceived it, and the vulnerabilities within the SolarWinds system before the breach. It will also analyze and evaluate the lessons learned from the SolarWinds breach and explore security measures implemented after the attack
doi_str_mv 10.33642/ijbass.v7n9p2
format Article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_33642_ijbass_v7n9p2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_33642_ijbass_v7n9p2</sourcerecordid><originalsourceid>FETCH-LOGICAL-c792-555daae0abdc72e364dda19efcd42c4838bb11393d7e6105c3c653c37bf0025a3</originalsourceid><addsrcrecordid>eNpNj81KAzEURoMoWGq3rvMCMya5k6RZSqlWqChacDncSTIy_cmU3EHw7a0dF66-s_o4h7FbKUoAU6m7btsgUfllkzuqCzZRlXGF0UJe_uNrNiPaCiGUFhqMnTCxTEPMx9xR5G8d7fgzJvyMh5gG_trTwN_7PWb-0aVAfIV-d8OuWtxTnP3tlG0elpvFqli_PD4t7teFt04VWuuAGAU2wVsVT4YhoHSx9aFSvprDvGmkBAfBRiOF9uCNBg-2aX_lEKasHG997olybOuT4wHzdy1FfS6ux-J6LIYfRFxLMg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Enterprise Risk Management Post Solar Winds Hack</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Lamar, Dr. Shetia C. Butler ; Kuralt, Michelle ; Zidor-Guerrier, Carolyn</creator><creatorcontrib>Lamar, Dr. Shetia C. Butler ; Kuralt, Michelle ; Zidor-Guerrier, Carolyn</creatorcontrib><description>Along with the rising demand for companies to facilitate business functions more efficiently, information technology has increasingly become a vehicle to bring about the convenience and efficiency that companies require to promote effective business operations. With such reliance upon information technology solutions comes the potential for companies to become more vulnerable to possible security incidents with their increased reliance upon third-party vendors for software solutions. This paper seeks to explore the software company SolarWinds and analyze its 2020 security breach. This paper will discuss how the SolarWinds breach occurred, how IT Security Professionals perceived it, and the vulnerabilities within the SolarWinds system before the breach. It will also analyze and evaluate the lessons learned from the SolarWinds breach and explore security measures implemented after the attack</description><identifier>ISSN: 2469-6501</identifier><identifier>EISSN: 2469-6501</identifier><identifier>DOI: 10.33642/ijbass.v7n9p2</identifier><language>eng</language><ispartof>International journal of business and applied social science, 2021-09, p.13-19</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Lamar, Dr. Shetia C. Butler</creatorcontrib><creatorcontrib>Kuralt, Michelle</creatorcontrib><creatorcontrib>Zidor-Guerrier, Carolyn</creatorcontrib><title>Enterprise Risk Management Post Solar Winds Hack</title><title>International journal of business and applied social science</title><description>Along with the rising demand for companies to facilitate business functions more efficiently, information technology has increasingly become a vehicle to bring about the convenience and efficiency that companies require to promote effective business operations. With such reliance upon information technology solutions comes the potential for companies to become more vulnerable to possible security incidents with their increased reliance upon third-party vendors for software solutions. This paper seeks to explore the software company SolarWinds and analyze its 2020 security breach. This paper will discuss how the SolarWinds breach occurred, how IT Security Professionals perceived it, and the vulnerabilities within the SolarWinds system before the breach. It will also analyze and evaluate the lessons learned from the SolarWinds breach and explore security measures implemented after the attack</description><issn>2469-6501</issn><issn>2469-6501</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNpNj81KAzEURoMoWGq3rvMCMya5k6RZSqlWqChacDncSTIy_cmU3EHw7a0dF66-s_o4h7FbKUoAU6m7btsgUfllkzuqCzZRlXGF0UJe_uNrNiPaCiGUFhqMnTCxTEPMx9xR5G8d7fgzJvyMh5gG_trTwN_7PWb-0aVAfIV-d8OuWtxTnP3tlG0elpvFqli_PD4t7teFt04VWuuAGAU2wVsVT4YhoHSx9aFSvprDvGmkBAfBRiOF9uCNBg-2aX_lEKasHG997olybOuT4wHzdy1FfS6ux-J6LIYfRFxLMg</recordid><startdate>20210930</startdate><enddate>20210930</enddate><creator>Lamar, Dr. Shetia C. Butler</creator><creator>Kuralt, Michelle</creator><creator>Zidor-Guerrier, Carolyn</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20210930</creationdate><title>Enterprise Risk Management Post Solar Winds Hack</title><author>Lamar, Dr. Shetia C. Butler ; Kuralt, Michelle ; Zidor-Guerrier, Carolyn</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c792-555daae0abdc72e364dda19efcd42c4838bb11393d7e6105c3c653c37bf0025a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Lamar, Dr. Shetia C. Butler</creatorcontrib><creatorcontrib>Kuralt, Michelle</creatorcontrib><creatorcontrib>Zidor-Guerrier, Carolyn</creatorcontrib><collection>CrossRef</collection><jtitle>International journal of business and applied social science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lamar, Dr. Shetia C. Butler</au><au>Kuralt, Michelle</au><au>Zidor-Guerrier, Carolyn</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enterprise Risk Management Post Solar Winds Hack</atitle><jtitle>International journal of business and applied social science</jtitle><date>2021-09-30</date><risdate>2021</risdate><spage>13</spage><epage>19</epage><pages>13-19</pages><issn>2469-6501</issn><eissn>2469-6501</eissn><abstract>Along with the rising demand for companies to facilitate business functions more efficiently, information technology has increasingly become a vehicle to bring about the convenience and efficiency that companies require to promote effective business operations. With such reliance upon information technology solutions comes the potential for companies to become more vulnerable to possible security incidents with their increased reliance upon third-party vendors for software solutions. This paper seeks to explore the software company SolarWinds and analyze its 2020 security breach. This paper will discuss how the SolarWinds breach occurred, how IT Security Professionals perceived it, and the vulnerabilities within the SolarWinds system before the breach. It will also analyze and evaluate the lessons learned from the SolarWinds breach and explore security measures implemented after the attack</abstract><doi>10.33642/ijbass.v7n9p2</doi><tpages>7</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2469-6501
ispartof International journal of business and applied social science, 2021-09, p.13-19
issn 2469-6501
2469-6501
language eng
recordid cdi_crossref_primary_10_33642_ijbass_v7n9p2
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
title Enterprise Risk Management Post Solar Winds Hack
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T08%3A16%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enterprise%20Risk%20Management%20Post%20Solar%20Winds%20Hack&rft.jtitle=International%20journal%20of%20business%20and%20applied%20social%20science&rft.au=Lamar,%20Dr.%20Shetia%20C.%20Butler&rft.date=2021-09-30&rft.spage=13&rft.epage=19&rft.pages=13-19&rft.issn=2469-6501&rft.eissn=2469-6501&rft_id=info:doi/10.33642/ijbass.v7n9p2&rft_dat=%3Ccrossref%3E10_33642_ijbass_v7n9p2%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true