MGMT221 Module 3.3 Discussion Latest 2017 April
Subject: Business / Management
3.3 Discussion: Cyberthreat
58 58 unread replies. 64 64 replies.
two_social_conversation_bubbles.jpgDiscussion participation in this course is taken very seriously. If you have not read the Discussion Assignments Overview and Requirements information, do so before you participate in the discussion area.
APA Style citing and referencing is a stringent requirement for any “borrowed” data that is posted in the Discussions as well as submitted in the other assignments in this course. Select Course Specific APA Style Instructions and Guidance to access an excellent guide with tips on how to utilize APA Style to format in-text citations and references.
The following are specific Discussion requirements:
Initial posts must be made by mid-week (Day four).
Respond to a minimum of two of your peers’ posts.
To assist your instructor in evaluating your work, when creating your initial post, copy the question from the activity and paste it in bold font just before your answer.
To assist the readers in keeping track of who the involved parties are in a specific discussion, begin your response posts with the name of the peer to whom you are responding.
Place appropriate APA Style in-text citations and a Reference Table for any “borrowed” data obtained from a source.
Your data needs to be grammatically sound and free of spelling errors.
Using terminology from the reference sources in your answers will enhance your grade.
Unless you are a subject matter expert on the topic, based on your degrees, certifications or “on the job training,” do not submit data obtained only from personal experience.
Mod3-Cyber attack AO2.Chapter 5 of the course textbook states: “In 2013, cyberthreats were at the top of US intelligence reports for the first time. Cyberthreats are now the number one type of danger facing the United States, according to current National Intelligence Director James Clapper, who coordinates the CIA, NSA, and many other agencies” (Turban, Volonino, & Wood, 2015, p.152).
Question: Perhaps you, a friend, or relative have been the victim of one of the recent cyber attacks at Target, BofA, or Citibank. Is it possible for businesses such as these to fully prevent such threats to your personal security or are they fighting a losing battle?
Remember, the goal in the Discussion is to create an atmosphere of interaction by posting meaningful responses that advance and expand the depth of the discussion. Do this by providing additional support to your peers’ initial and response posts, or if appropriate, by challenging them if you feel that the data that they presented is weak. Likewise, when a peer challenges the data in your posts, debate the issue, and providing further support for your points of view on the topic.