Skip to content
Snippets Groups Projects
Commit d0de9f1e authored by James D'Alton's avatar James D'Alton
Browse files

Rewrite of accidentally plagiarised paragraphs

parent d911c065
No related branches found
No related tags found
1 merge request!1Final report
......@@ -22,10 +22,10 @@
There has been a significant increase in cyber criminal activity in recent years. \cite{GDPR} The methods used by criminals are currently changing as businesses begin to be targeted more frequently than individuals. \cite{GDPR} Cyber crime is growing at a rapid rate, making it increasingly troublesome for regulations and legislation to keep pace, resulting in outdated laws that are often unfit for purpose. \cite{GDPR}
\section{Supply Chains}
Supply chain management is an integrating function with primary responsibility for linking major business functions and business processes within and across companies into a cohesive and high-performing business model. \cite{CSCRM} It includes all logistics management activities as well as manufacturing operations, and it drives coordination of processes and activities within and across marketing, sales, product design, finance, and information technology. \cite{CSCRM}
Supply chain management is a process essential for linking major business actions and behaviours internally and between companies into a capable and effective business model. \cite{CSCRM} It encompasses all logistics management endeavours not to mention manufacturing operations, and it propels coordination of activities across marketing, sales, product design, finance, and IT. \cite{CSCRM}
\subsection{Supply Chain Security}
Supply chain security focuses on the potential threats associated with an organisation\textquoteright s suppliers of goods and services, many of which may have extensive access to resources and assets within the enterprise environment or to an organisation\textquoteright s customer environments - some of which may be sensitive in nature. \cite{CombattingCyberRisks}
Supply chain security concentrates on the threats linked to an organisation\textquoteright s suppliers of goods and services, many of which potentially have considerable access to assets belonging to the company or to it\textquoteright s customer data. \cite{CombattingCyberRisks}
\section{Impacts}
Cyber attacks are financially devastating and disrupting to people and businesses. Successful attacks have the potential to expose personal information, leaving the victims of these security breaches vulnerable to fraud. \cite{CyberCrime} Victims are also left vulnerable to further attacks, using the information previously gathered by attackers.
......@@ -38,4 +38,14 @@
\section{Case Study: Pouring Pounds Ltd}
Two cashback sites owned by Pouring Pounds Ltd were found to have leaked two terabytes worth of personally identifiable information and account data. This was made possible because of an unprotected database, which could be accessed through an exposed port on the company's server. The leak occured in October 2019 and has affected approximately 3.5 million individuals. \cite{z6mag}
\ No newline at end of file
Two cashback sites owned by Pouring Pounds Ltd were found to have leaked two terabytes worth of personally identifiable information and account data. This was made possible because of an unprotected database, which could be accessed through an exposed port on the company's server. The leak occured in October 2019 and has affected approximately 3.5 million individuals. \cite{z6mag}
\section{Previous and Similar Work}
TO DO
\subsection{Example 1}
TODO
\subsection{Example 2}
TODO
\ No newline at end of file
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment