Conduct a critical analysis of two of your classmates posts (attached, post 1 and post 2) by the last day of the workshop.
- Conduct a critical analysis of two of your classmates’ posts (attached, post 1 and post 2) by the last day of the workshop.
- Each response to your classmates should be at least 150 words each in length and include a citation to one credible information source.
Post 1: Deepthi T
Understanding the Cybersecurity Landscape
a.
There are several current security incidents:
Spying campaigns aimed at military and government institutions in South-East Asia started in 2019 with Chinese military operatives.
The malware caused a failure for airline booking systems, which caused a crash in networks of 20 low-cost airlines worldwide.
Russian hackers intimidated Ukrainian officials by pulping a spear as tensions between the two countries increased in early 2021.
Swedish officials reported in late2017 and early2018 that the Swedish Sports Confederation was hacked in response to charges of the Russian state cheating of Russian athletes Russian military intelligence (Labs, 2021).
These incidents have several causes and affect the privacy and work of the user.
b.
Another technology company claims that a ransomware attack has caused reservation systems to collapse over a day-long period at about 20 low-cost airlines worldwide. Radixx said on Tuesday that the organization found an "unusual phenomenon" around its program for reservations. The software has not been defined or how it has entered the application. Avelo Airlines, which cannot book its first flight in California next week, can hardly have even worse timing. Avelo made excuses on his homepage and urged buyers to check flight listings even though they could not book a journey. Malware breaks an organization's network and can potentially interrupt company activities. In certain circumstances, major programs provided by the corporation can also be disabled. This will result in massive losses for companies. Through forging into the host computer, malware can quickly access confidential business details. It is one of the biggest consequences for companies of malware. The activities of the company will be damaged. In certain circumstances, ransomware may also cause hardware failure. The above are all just some of the biggest risks of malware (Razak et al., 2016).
c.
They're some of the major points that help to mitigate cyber-attack:
· Install antivirus software on the computers
· Keep updating all of the software
· Need to buy an app on the reliable source
· Take a backup of all data every day
I would implement these policies appropriately as it is to mitigate this attack. These policies help the employees to avoid mistakes (Codingest, 2021).
References
Codingest. (2021, April 26). Malware Attack at Technology Provider Radixx Causes Outages in Airline Reservation Systems. Cyber News. https://cybernews.cloud/malware-attack-at-technology-provider-radixx-causes-outages-in-airline-reservation-systems
Labs, C. (2021). Malware Attack at Technology Provider Radixx Causes Outages in Airline Reservation Systems. Cyware Labs. https://cyware.com/news/malware-attack-at-technology-provider-radixx-causes-outages-in-airline-reservation-systems-44281254
Razak, M. F. A., Anuar, N. B., Salleh, R., & Firdaus, A. (2016). The rise of “malware”: Bibliometric analysis of malware study. Journal of Network and Computer Applications, 75, 58–76. https://doi.org/10.1016/j.jnca.2016.08.022
Post 2: Aditya Singh
Information Systems Security
The development in the cyber security environment has recently slowed, as has the number of attacks and data breaches. A recent data breach is the NHS trust that administers hospitals in Sandwell and Birmingham, which faced a serious IT data loss event that disrupted staff and patient care. The event, which occurred last month, is claimed to have impacted over twenty systems throughout the hospitals. Another instance is the California public office admitting to a COVID-19 healthcare data leak. A compromised database controlled by a California public office may have compromised people's sensitive medical information and it was determined that the compromise was caused by a third-party contractor's error and emerged on the county's public webserver (Park, 2019). The major cause of such instances is a digital vulnerability, such as a hacked access control system, authentication system, or vulnerability detection system. Because of any of these flaws, the hackers go unnoticed. Weak access control, a compromised vulnerability detection system and a lack of an effective authentication mechanism are examples of vulnerabilities.
This sort of data breach occurs in the Black Country hospital trust caused short-term organizational instability. The organization's focus shifted from service to threat removal. This resulted in the postponement of various operations and procedures involving clinical risk evaluation. On the other hand, long after the initial impact of the data breach, there were a variety of long-term consequences that caused potential damage to the business. It included a drop in sales, lost revenues, loss of data, and interruptions in operations and functioning (Coventry & Branley,2018). As a result, the executive team agreed to hire an IT team from a local NHS trust to investigate the cause of the issue and assess the robustness of our technological response.
The following will therefore help mitigate such incidents:
· Providing an effective access control system
· A highly effective vulnerability detection system
· System of rapid mitigation
The implementation of these principles is required for every organization's security. It necessitates frequent testing and training for staff. To ensure their efficacy, testing processes must adhere to the specified protocol. A frequent control and update mechanism is required to keep these security settings current (Callen & James, 2020). Furthermore, sufficient training must be provided to employees in order to avoid mishaps. Employees cannot overcome the potential for recurrent mistakes without training in a real-world situation. Training improves the skills that are in charge of the effective application of the process and measures. As a result, personnel must be trained to prevent making errors.
References
Callen, J., & James, J. E. (2020). CYBERSECURITY ENGINEERING: THE GROWING NEED. Issues in Information Systems, 21(4).
Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas, 113, 48-52.
Park, S. (2019). Why information security law has been ineffective in addressing security vulnerabilities: Evidence from California data breach notifications and relevant court and government records. International Review of Law and Economics, 58, 132-145.
less
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.