Question

Research modern cyber requirements and share with the class how they differ from traditional enterprise security...

Research modern cyber requirements and share with the class how they differ from traditional enterprise security requirements. How do these requirements affect the way an organization might want to protect its data? Provide a real-life example of a cybersecurity failure.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Cyber security:

The cyber security is a way/practice to how we secure our computers, mobiles, servers, networks and many other electronic systems. From the past few decades the cyber crimes are growing like anything and became so common that sometimes we receive a call and someone asks for our credit/debit card credentials.

Provided a pie chart above showing worldwide cyber attacks and the figures behind this has been grown with time.

Modern Cyber Security Requirements:

The modern cyber requirements needs to be dynamic as the modern cyber problems are to cope with:

   -Ransomware:

    Ransomware is the bane of cybersecurity, IT, data professionals, and executives. Includes spreading virus that latches      onto customer and business information that can only be removed if you meet the cybercriminal’s demands. And usually, those demands land in the hundreds of thousands (if not millions) of dollars.

Ransomware attacks are one of the areas of cybercrime growing the fastest, too. The number of attacks has risen 36 percent this year (and doubled in cost). The attacks are increasing by time while it should be minimized.

-Artificial Intelligence

Robots might be able to help defend against incoming cyber-attacks. Artificial has grown like a boom even the attackers are happily using AI approach to attack. Hence, security with AI is definitely gonna help in near future. With that development comes several benefits. First of all, you don’t have to pay robots by the hour. They work for free once you have them. (Also, no healthcare or catered lunch). Which brings us to the next benefit. Namely, that they can work around the clock. (Sans overtime.) Robots don’t take breaks. Humans do.

How they differ from traditional ones: The current cybersecurity requirements are dynamic and if an attack occurs the time to fix that is required so low at the current scenario. Back then, the internet speed wasn't that fast the devices weren't this much interconnected if at current scenario if an attack occurs most of the users prefer high speed internet which gives attacker the required data or can spread the infection within a few seconds.

-IoT Threats

Most people are always plugged in. The vast majority of humans in first-world countries have an iPhone in their pockets, a computer at work, a television at home, and a tablet in their cars.

The Internet of Things is making sure that every single device you own is connected. Your refrigerator can tell you when the milk runs out. Alexa can order you a pizza. Of course, all of that connection carries with it massive benefits, which is what makes it so appealing in the first place. You no longer have to log in on multiple devices. You can easily control your TV with your phone.

The problem is that all of that interconnectedness makes consumers highly susceptible to cyberattacks. In fact, one study revealed that 70 percent of IoT devices have serious security vulnerabilities. Specifically, insecure web interfaces and data transfers, insufficient authentication methods, and a lack of consumer security knowledge leave users open to attacks.

Real-life example of cyber security failure:

YAAHOO!

In December of 2016, Yahoo! reported that 1 billion user accounts had been hacked, and sent user notifications out in February of 2017. Unfortunately, it was later disclosed in October 2017 that the breach had actually taken place in 2013 and 3 billion user accounts were affected (that is every single user account at that time). Additionally, Yahoo! suffered a separate breach in late 2014 that wasn’t disclosed until 2016 that affected 500 million accounts. These breaches are the two largest breaches in the history of the Internet. It took 4 years for full disclosure.

At issue was the unfortunate fact that users weren’t required to change their passwords. Yahoo! was using the MD5 algorithm for their hash function, which is relatively easy to crack. Consequently, usernames and passwords were compromised, along with answers to encrypted security questions. Again, the big fail here is the delay in discovery and reporting, not to mention the lax attitude within Yahoo! towards security. Until very recently, Yahoo! still didn’t require users to change their passwords. This has now become one of the largest class action lawsuits ever because of the amount of time it took to disclose.

Thanks.

Add a comment
Know the answer?
Add Answer to:
Research modern cyber requirements and share with the class how they differ from traditional enterprise security...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • How do the concepts of servant leadership and stewardship differ from traditional leadership philosophies? Provide a...

    How do the concepts of servant leadership and stewardship differ from traditional leadership philosophies? Provide a “real-life” example of someone you think demonstrates a servant leadership approach in his or her role as a leader (this can be someone you know personally or a well-known figure).  ?(word count 150)

  • CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private,...

    CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...

  • Organizations must share data. As more and more corporations share information with each other, more and...

    Organizations must share data. As more and more corporations share information with each other, more and more vulnerabilities exist. However, consumers and employees do not completely own the data they generate depending on the context. For example, while a health record may be about you, and you have certain granted rights to view that record, you do not own the record. The vast majority of data on or about a person or company is not owned by that person or...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Question: Explain how the traditional approach and modern portfolio theory can be blended into an approach...

    Question: Explain how the traditional approach and modern portfolio theory can be blended into an approach to portfolio management that might prove useful to the individual investor. Relate this to reconciling Walt’s and Shane’s differing points of view. Walt Davies and Shane O’Brien are district managers for Lee, Inc. Over time, as they moved through the firm’s sales organization, they became close friends. Walt, who is 33 years old, currently lives in Princeton, New Jersey. Shane, who is 35, lives...

  • NO COPIED ANSWER PLEASE, I WILL UPVOTE YOURS!! YOUR TOPIC IS Artificial Intelligence, WRITE A RESEARCH...

    NO COPIED ANSWER PLEASE, I WILL UPVOTE YOURS!! YOUR TOPIC IS Artificial Intelligence, WRITE A RESEARCH PAPER following SLOs: The student will analyze the impact of specific practices, programs, and benchmarks (qualitative / quantitative) used by organizations to support valuing diversity. The student will analyze the impact of tools, methods, and significant barriers, for effective Internal organizational communication. The student will explore or analyze the impact of Change Management on profitability. The student will analyze the impact of key HR...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • (1) Imagine you want to change someone's attitude on what car to purchase. Describe how you would (2) In the Yale Attitude Change approach, there are three u wantedcomponents to attitude chan...

    (1) Imagine you want to change someone's attitude on what car to purchase. Describe how you would (2) In the Yale Attitude Change approach, there are three u wantedcomponents to attitude change. form your arguments if you Chapter 7 to use central and peripheral routes Identify and describe these three of persuasion. Which type of persuasion would lead to long- lasting attitude change? parts of the model. Then state the major criticism of this model. (3) After the Milgram study,...

  • Congn UlIHISsion 074 Cong'c es that arise in research on research to provide guidance on the...

    Congn UlIHISsion 074 Cong'c es that arise in research on research to provide guidance on the ethical on human subjects. The result of the commission's work is this report, hics and elucidates which lays out a general approach to thinking about research tes the three most relevant moral principles-respect for three beneficence, and justice. chical Principles and Guidelines for Res h Involving Human Subjects partly because both often occur together (as in re- search designed to evaluate a therapy) and...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT