Course Hero Logo

Business and personal loss if cybersecurity did not

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 8 - 11 out of 11 pages.

business and personal loss. If cybersecurity did not exist there would be nothing to stop hackersfrom stealing what they want with no one to stop them. Cybersecurity suppliers are veryimportant as well. They provide the people, process, and technologies that help regulate thecybersecurity landscape. These providers are not perfect. Hardware and software products can beflawed from the time of production if the proper due diligence is not performed by thesecompanies to secure their products and services. Improperly constructed products can lead todata breaches that will greatly impact the organization who trusted these products. Because ofthis, Product liability needs to fall in the hands of the developer and not transferred to thepurchaser. Transferring risk is a problem because the end results is out of the hands of theorganization who purchased the product. The product was marketed as safe and flawless;therefore, it should act accordingly. An organization can lose millions of dollars and possibly goout of business due to product negligence. Organization need to protect themselves not only fromattackers but from the organization who claim to offer protection. A hold harmless agreement,and a statement of financial liability agreement will help organization combat any risk liabilitythat they would have originally gained from an organization who offers faulty products.
ACQUISITION RISK9ReferencesAdair, B. (2018). Salesforce Competitors: 20 Salesforce Alternatives. Retrieved fromAugust, T. & Tunay, T. (2011). Who Should Be Responsible for Software Security? AComparative Analysis of Liability Policies in Network Environments. (5)57. P934-959.26p. Retrieved from ?vid=0&sid=138fea2c-aa6a-4d93-9940-a43a0cf5b5b5%40pdc-v-sessmgr01&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#AN=61216498&db=hehCisco, (n.d.). Products by Technology. Retrieved fromD&B Hoovers. (2019). Salesforce.com Retrieved from-com.ezproxy.umuc.edu/company/0c41343a-63e7-31d7-b673-4e009d75455f#report/company_summaryDeloitte, (n.d.). Services. Retrieved from-deloitte/solutions/services.htmlHiggins, J.K. (2015). Security Product Liability Protections Emerge. Retrieved from-protections-emerge/d/d-id/1320274
ACQUISITION RISK10Tracy, R. (2017). A Tale of Two Frameworks: The NIST CSF and NIST RMF Are Not the Same.Retrieved from-nist-rmf-confusion/McGraw, G. (2004). Software security. Retrieved fromMorgan, J. (2018). How to Use the NIST Cybersecurity Framework. Retrieved from-nist-cybersecurity-frameworkNIST, (n.d.). An Introduction to the Components of the Framework. Retrieved fromOne Comodo, (2018). What is Cybersecurity? Retrieved fromSecurity First, (2018). Why is Cyber Security Important in 2018? Retrieved fromSheymov, V. (2015). Product Liability—the Unique Position of the Cybersecurity Industry.Retrieved from -of-the-cybersecurity-industry/Symantec, (n.d.). Symantec Protection Suite Enterprise Edition. Retrieved from
ACQUISITION RISK11Travelers, (n.d.). 5 Steps for Product Liability Risk Management. Retrieved from-liability-risk-managementVillasenor, J. (2011). Ensuring Hardware Cybersecurity. Retrieved fromWeinberger, M. (2018). The rise of Marc Benioff, the bombastic Salesforce CEO who's buyingup Time Magazine for $190 million. Retrieved from /the-rise-of-salesforce-ceo-marc-benioff-2016-3
End of preview. Want to read all 11 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Computer Security, Operational risk

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture