Question

DOCK STUDID Turnitin Editor - Chagg Writing . . For each discussion topic, you must make a minimum of three substantive posts
In your opinion, what could the hospital do to stop the attack and contain the damage? Which computer fraud and abuse techniq
0 0
Add a comment Improve this question Transcribed image text
Answer #1

The hospital can stop the attack and contain the damage by using the kill switch that comes with their VPN i.e. virtual private network. What the kill switch does is that it immediately stops access to confidential information and ensures that access to private data through a public network is not allowed. The kill switch will stop transfer of data and will hopefully contain the damage at the right time. Also the malware that was used for the attack should be identified and the hospital’s antivirus vendor should be informed about the same so that the antivirus software can then take care of the bots and deal with the malware.

The computer fraud and abuse technique that the hackers used in their attack on the hospital is called “Zero day attack”. This is an advanced cyber-attack that takes advantage of a software vulnerability or operating system vulnerability. Here the vulnerability was present in Microsoft’s operating system.

The hospital should have taken a few steps and measures that could have prevented the damage caused by the attack. Firstly it should have got protection that worked at DNS level. Auto patch management tools are also available and the hospital should have used that. Secondly it should have disabled automatic software installation in its system and instead opted for manual software installation. Thirdly it should have made use of network compartmentalization as it would have helped to put up access controls to limit internal communication. It also monitors tracks of unexpected connections, highlighting the presence of a cyberattack.

(225 words)

Add a comment
Know the answer?
Add Answer to:
DOCK STUDID Turnitin Editor - Chagg Writing . . For each discussion topic, you must make...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Discussions List View Topic Chapter 1 Discussion assignment Available after Monday, January 21. 2019 8:00 AM...

    Discussions List View Topic Chapter 1 Discussion assignment Available after Monday, January 21. 2019 8:00 AM CST. Unlocked: Monday, January 21, 2019 8:00 AM CST-Tues Subscribe Under the doctrine of stare decisis, courts are obligated to follow the precedents established in their jurisdiction unless there is a compelling reason not to. Should U.S courts continue to adhere to this common law principle, given that our government now regulates so many areas by statute? (NOTE: this topic will close at the...

  • Settings 06 Discussion Question Unlocked: Monday, February 24, 2020 12:00 AM EST - Sunday, March 1,...

    Settings 06 Discussion Question Unlocked: Monday, February 24, 2020 12:00 AM EST - Sunday, March 1, 2020 11:00 PM EST. Subscribe Search the internet and find an instance of "Earnings Mismanagement" and "Fraud" in your pathway. In a minimum of 3 paragraphs, tell us: • The company name in the subject line of your post). • Why this company interests you. . When they did it • Describe in detail what they did and how they got caught. • Tell...

  • Before starting the discussion you must read the following Required Supplemental Reading Material posted in Blackboard...

    Before starting the discussion you must read the following Required Supplemental Reading Material posted in Blackboard Lectures. Week 4.a: Social Media then and now http://www.ragan.com/Main/Articles/48761.aspx Week 4.b: Delivering Bad News https://www.forbes.com/sites/erikaandersen/2013/03/06/how-great-leaders-deliver-bad-news/#7ee7004c3dc6 (please copy/paste this link into your browser search area in order to open it) When you have read the above articles, you must do two things: 1. Write a summary of what you have learned from the articles, what you agreed (or disagreed with) and so on. Discuss (talk...

  • Have you ever considered how we come to understand the world around us? Think about that question for a minute. What is...

    Have you ever considered how we come to understand the world around us? Think about that question for a minute. What is science, and how do we use it to solve real-world problems? In our first discussion, I want to delve into thinking about the nature of biology. This includes what it is, the major themes, and how we come to form claims or knowledge. You should spend approximately 3 hours on this assignment. Instructions Use the text readings and...

  • please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun...

    please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun 28, 2019 at 11:59 PM Please read the article titled Evolution of Operations Planning and Control: from production to supply chains In at least three paragraphs, describe how and why the focus of operations planning and control has changed over time. While one might argue that answers consisting of sentences quoted from articles do not represent plagiarism, I do not consider them acceptable, and...

  • please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun...

    please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun 28, 2019 at 11:59 PM Please read the article titled Evolution of Operations Planning and Control: from production to supply chains In at least three paragraphs, describe how and why the focus of operations planning and control has changed over time. While one might argue that answers consisting of sentences quoted from articles do not represent plagiarism, I do not consider them acceptable, and...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • i really need help with the graphs Driving Can Be Dangerous to Your Health: An Interrupted...

    i really need help with the graphs Driving Can Be Dangerous to Your Health: An Interrupted Case Study in Physiology Phil Stephens Department of Biology Villanova University Part 1-The Grandparents Arrive Dave pulled the cell phone out of his pocket, cursing himself for not putting it on vibrate. The children, Jason and Laura, were both asleep, and he knew that the rest of the day would not be fun if they were awakened from their naps. "Hi, Dave. We're just...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT