That is, either an email or malware document corrupted the system allowing the keylogger access to credentials, data, information and company assets. In this way, the cyber-attack violated the core tenets of cyber-security system focus on what's crucial, move key assets out of band, and detect/react/adapt (Hughes & Cybenko, 2014). Meaning the methodology to control the occurrence failed to lead to less focus on improving the security of the system with different procedures. Thereby, it questions Lockheed-Martin's motive with retaining the cryptosystem and …show more content…
Since then companies began to become more aware of the problems associated with computer and security. Only in 2013, the Utah government reported twenty-million cyber-attacks each day, so it suggests that there are trillions of cyber-attacks worldwide (Millions of Cyber Attacks Each Day, 2015). So, the steps that companies take are an organizational framework with new operations towards employee education, organizational policies, IT and network advisors to limit access as a job-related function (Trim & Yam-Im, 2010). Meaning education combined with limiting the number of people having full access to everything decreases the chance of a cyber-attack and with the security of an IT specialist proactively monitoring the system. For example, Lockheed-Martin's cyber-kill chain that stops the stages of malware by reconnaissance, weaponization, delivery, exploit, installation, command & control, and actions (Mattern, Felker, Borum, & Bamford, 2014). Although, many companies have taken steps and precautions towards thwarting cyber-attack violators of computer and security still manage to infiltrate systems. That is due to companies failing to change current methodologies to compensate for the advancement of technology and more