Managing Risks in Digital Transformation by Ashish Kumar & Shashank Kumar & Abbas Kudrati
Author:Ashish Kumar & Shashank Kumar & Abbas Kudrati
Language: eng
Format: epub
Publisher: Packt
Published: 2023-04-15T00:00:00+00:00
The cost of damage to equipment, assets, and IT systems
The English word sabotage means a deliberate action aimed at weakening a polity, effort, or organization through subversion, obstruction, disruption, or destruction. A popular but unverified story explains the origins of the word thus â sabot is a French word that means âwooden shoes.â In 16th century Belgium, some textile workers who were disgruntled with their employer are said to have thrown their wooden shoes in the textile machinery wheels. The stuck shoes would damage the equipment and bring production to a standstill. Another famous reference is to the Luddites in 19th century England, who were a secret organization of workers that damaged textile mills to protest the increasing mechanization of the mills, which threatened the employment prospects of the existing workers.
Historical footnotes aside, an employee who perceives injustice at the workplace or has any nefarious agenda is likely to try and damage the assets of the workplace surreptitiously. With the rapid digitization of the enterprise landscape, the modern-day sabot is likely to be digitally thrown while the physical premises remain vulnerable as well.
A large educational institution parted ways with an IT employee because the employee did not agree to relocate to the suggested location of work. The employee believed that he had made his location preferences clear at the time of the appointment itself and suspected that he was singled out because of a racial discrimination claim he had filed against his superiors a while ago. He was given a severance package, but the employee carried a grudge against the perceived or real injustice of the whole scenario. As a way of revenge, he changed the password of his institutionâs cloud service provider account before leaving. The moment he left, thousands of users of this institution lost access to their emails and other services. The whole institutionâs daily work came to a standstill for days and when they tried contacting this now ex-employee, he feigned innocence. Apparently, the ex-employee then sought hundreds of thousands of dollars to restore access for his ex-employer.
The damage to a companyâs access and IT systems can be costly. The method to put a numerical dollar against this cost varies based on the actual scenario. In the preceding example, the loss of productive time for users can be costed by deciding upon a financial value that a productive user generates or is compensated for over that period. Any additional expense incurred to correct the system either in man-hours or extra money spent on solutions is added to this cost.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Future Crimes by Marc Goodman(3025)
Mastering Python for Networking and Security by José Manuel Ortega(3003)
Blockchain Basics by Daniel Drescher(2928)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2849)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2680)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2539)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2510)
Machine Learning Security Principles by John Paul Mueller(2415)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(2404)
The Art Of Deception by Kevin Mitnick(2325)
The Code Book by Simon Singh(2250)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(2087)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(2078)
Solidity Programming Essentials by Ritesh Modi(2013)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1919)
Wireless Hacking 101 by Karina Astudillo(1872)
DarkMarket by Misha Glenny(1865)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1855)
Mobile Forensics Cookbook by Igor Mikhaylov(1828)