Cyberattacks
Background: Cyberattacks can be costly and may impact a company’s reputation. In addition, business executives can lose their jobs, as was the case at Sony, Target, and Experian after cybersecurity breaches. There are many types of cyberattacks including phishing, man-in-the-middle, denial-of-service, SQL injection, ransomware, spyware, worms, Trojans, viruses, cryptojacking, and password attacks. Depending on the nature of the attack, various countermeasures are required. A cyberattack can destroy, modify, or leak corporate data, disrupt the computing and networking infrastructure, or steal intellectual property.
The cyberattack in “The Untold Story of NotPetya, the Most Devastating Cyberattack in History” used a Trojan Horse embedded in the M.E.Docs software to deliver a computer worm. A Trojan Horse is malicious computer code implanted in trusted software. The Trojan included a worm that could spread automatically across the network and appeared to install ransomware, but in reality it rendered the computer servers unusable, even if companies tried to pay the ransom. Many typical cybersecurity measures, such as two-factor authentication, would not have prevented this particular attack, but one approach that would have mitigated the damage was offline systems backups.
Companies implement various cybersecurity measures to counter various types of attacks. However, not every cyberattack is thwarted by the same countermeasure. Preventive measures are not just technical, but also involve business initiatives such as changes to business processes, training initiatives, realignment of roles and responsibilities, cybersecurity audits, and/or cybersecurity drills. Given budgets for cybersecurity are often limited, it is important to understand what actions can prevent or mitigate what type of cyberattacks. This enables more informed business decisions about costs and risks.
Discussion: This discussion aims to identify the specific countermeasure for a particular type of cyberattack to avoid damage to a company’s reputation and loss of trust in the organization.
Find an article published in the last year regarding a cyberattack. (Do not use the same article another student posted.) Summarize the article and identify the specific type of attack. Describe any damage caused and the impact on the organization.
Research the particular countermeasure(s) to prevent or mitigate the specific type of attack detailed in the article. Although companies have to implement a wide variety of cybersecurity tactics, describe one preventive or mitigation approach that would have had a major impact regarding the particular type of attack you described, and cite your sources. Do not list cybersecurity approaches that may be important but are irrelevant to the type of attack in the article.
Discuss the impact to the company you chose in Week 1 if it were to be hit with a similar type of attack. Be specific about the details of the countermeasure and what part(s) of the organization should be involved in leading and participating in the implementation of the cybersecurity approach. Would the required cybersecurity approach involve any changes in how the company does business? Please explain.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.