12 Mar Conduct a critical analysis of two of your classmates posts (attached, post 1 and post 2) by the last day of the workshop.
- Conduct a critical analysis of two of your classmates’ posts (attached, post 1 and post 2) by the last day of the workshop.
- Each response to your classmates should be at least 150 words each in length and include a citation to one credible information source.
Post 1: Deepthi T
Understanding the Cybersecurity Landscape
a.
There are several current security incidents:
Spying campaigns aimed at military and government institutions in South-East Asia started in 2019 with Chinese military operatives.
The malware caused a failure for airline booking systems, which caused a crash in networks of 20 low-cost airlines worldwide.
Russian hackers intimidated Ukrainian officials by pulping a spear as tensions between the two countries increased in early 2021.
Swedish officials reported in late2017 and early2018 that the Swedish Sports Confederation was hacked in response to charges of the Russian state cheating of Russian athletes Russian military intelligence (Labs, 2021).
These incidents have several causes and affect the privacy and work of the user.
b.
Another technology company claims that a ransomware attack has caused reservation systems to collapse over a day-long period at about 20 low-cost airlines worldwide. Radixx said on Tuesday that the organization found an "unusual phenomenon" around its program for reservations. The software has not been defined or how it has entered the application. Avelo Airlines, which cannot book its first flight in California next week, can hardly have even worse timing. Avelo made excuses on his homepage and urged buyers to check flight listings even though they could not book a journey. Malware breaks an organization's network and can potentially interrupt company activities. In certain circumstances, major programs provided by the corporation can also be disabled. This will result in massive losses for companies. Through forging into the host computer, malware can quickly access confidential business details. It is one of the biggest consequences for companies of malware. The activities of the company will be damaged. In certain circumstances, ransomware may also cause hardware failure. The above are all just some of the biggest risks of malware (Razak et al., 2016).
c.
They're some of the major points that help to mitigate cyber-attack:
· Install antivirus software on the computers
· Keep updating all of the software
· Need to buy an app on the reliable source
· Take a backup of all data every day
I would implement these policies appropriately as it is to mitigate this attack. These policies help the employees to avoid mistakes (Codingest, 2021).
References
Codingest. (2021, April 26). Malware Attack at Technology Provider Radixx Causes Outages in Airline Reservation Systems. Cyber News. https://cybernews.cloud/malware-attack-at-technology-provider-radixx-causes-outages-in-airline-reservation-systems
Labs, C. (2021). Malware Attack at Technology Provider Radixx Causes Outages in Airline Reservation Systems. Cyware Labs. https://cyware.com/news/malware-attack-at-technology-provider-radixx-causes-outages-in-airline-reservation-systems-44281254
Razak, M. F. A., Anuar, N. B., Salleh, R., & Firdaus, A. (2016). The rise of “malware”: Bibliometric analysis of malware study. Journal of Network and Computer Applications, 75, 58–76. https://doi.org/10.1016/j.jnca.2016.08.022
Post 2: Aditya Singh
Information Systems Security
The development in the cyber security environment has recently slowed, as has the number of attacks and data breaches. A recent data breach is the NHS trust that administers hospitals in Sandwell and Birmingham, which faced a serious IT data loss event that disrupted staff and patient care. The event, which occurred last month, is claimed to have impacted over twenty systems throughout the hospitals. Another instance is the California public office admitting to a COVID-19 healthcare data leak. A compromised database controlled by a California public office may have compromised people's sensitive medical information and it was determined that the compromise was caused by a third-party contractor's error and emerged on the county's public webserver (Park, 2019). The major cause of such instances is a digital vulnerability, such as a hacked access control system, authentication system, or vulnerability detection system. Because of any of these flaws, the hackers go unnoticed. Weak access control, a compromised vulnerability detection system and a lack of an effective authentication mechanism are examples of vulnerabilities.
This sort of data breach occurs in the Black Country hospital trust caused short-term organizational instability. The organization's focus shifted from service to threat removal. This resulted in the postponement of various operations and procedures involving clinical risk evaluation. On the other hand, long after the initial impact of the data breach, there were a variety of long-term consequences that caused potential damage to the business. It included a drop in sales, lost revenues, loss of data, and interruptions in operations and functioning (Coventry & Branley,2018). As a result, the executive team agreed to hire an IT team from a local NHS trust to investigate the cause of the issue and assess the robustness of our technological response.
The following will therefore help mitigate such incidents:
· Providing an effective access control system
· A highly effective vulnerability detection system
· System of rapid mitigation
The implementation of these principles is required for every organization's security. It necessitates frequent testing and training for staff. To ensure their efficacy, testing processes must adhere to the specified protocol. A frequent control and update mechanism is required to keep these security settings current (Callen & James, 2020). Furthermore, sufficient training must be provided to employees in order to avoid mishaps. Employees cannot overcome the potential for recurrent mistakes without training in a real-world situation. Training improves the skills that are in charge of the effective application of the process and measures. As a result, personnel must be trained to prevent making errors.
References
Callen, J., & James, J. E. (2020). CYBERSECURITY ENGINEERING: THE GROWING NEED. Issues in Information Systems, 21(4).
Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas, 113, 48-52.
Park, S. (2019). Why information security law has been ineffective in addressing security vulnerabilities: Evidence from California data breach notifications and relevant court and government records. International Review of Law and Economics, 58, 132-145.
less
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need help with this question?
Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.
WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Chat with us today! We are always waiting to answer all your questions.