Question

Describe one of the recent incidents that you may have come across (newspaper articles, stories, workplace...

Describe one of the recent incidents that you may have come across (newspaper articles, stories, workplace or related experience) regarding information security attack related issues. Explain the incident and provide information about how the organization/ individuals responded to such attacks. Also, provide information about what are the lessons learned.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

I will explain a cyber attack happened in India. Wannacry was a virus attacked the indian banks, expert banks and eminent bank professonal, millionariesin India. I will explain about this attack now.

The attack takes place in August 13, 2017 in India. Many isolated attacks were taken place specifically in bank servers asking for money. One of the message send to a millionaire threatened by saying "Please give us 1300 bitcoins in order to prevent the system from decryption attacks." Such, similar attacks were deployed in many parts of the country. The initial message of all this attacks were threatening of nature especially regarding bitcoins and money. In most of the attacks, the attacker has encrypted the user's confidential data and urged, threatened to pay for them to decrypt the files. The main source of the attack was occured by clicking certain links or .exe files in the system. Once, the attack has entered a system, then it will spread in the network to the related person of the victim just like an epidemic.

Here, a government organisation Indian Computer Emergency Response Team (CERT-In) has reported and alerted the main bank officers, officials and government officials about the attacks. Later, they found out that the attack was a part of a big attack carried out globally by the name "Ransomware".

Further, CERT-In has taken the following steps after detecting the attacks:

  • CERT-In immediately alerted the important government organisations by conducting a webinar. The special emphasis is given to National Informatics Centre (which controls all central and state government systems), the RBI, National Payments Corporation of India and Unique Identification Authority of India over the weekend of the attack.
  • Special telecom networks are being deployed for internet service providers for securing the network.
  • The attack was mostly focused on Windows based systems. So, the team of cyber security team has focused on giving protection to windows based systems.
  • Installed security patches issued by the microsoft corporation for immunizing corporation.
  • Urged the windows users especially to switch operating system from Windows to Linux.

LESSONS LEARNED BY ATTACK:

  • The attack was similar to that of a epidemic. It spreads across the network through a human intervention. The severity and tracking or preventive measures for such attacks can be taken only by finding the network of the epidemic.
  • Most of the attacks were mostly on the systems that uses pirated versions of the software. The reason for such attacks is because even if the attack is being deployed in such systems, the attackers would not complain to the software companies. That is why, most of the attacks are being deployed in pirated software systems.
  • The attacks are mainly on financial or money oriented organisations or persons.
  • Attacks were done by encrypting the confidential data on a system. This pinpoints towards more security on confidential data. A software for securing confidential data is urgent one in banking sectors and all.
  • attachments in emails that are .exe, .zip or .scr should generally not be clicked on without checking with the sender, and that one should be wary of emails from unknown addresses whether or not they have attachments or links. This is very important for employees working on financial companies.
Add a comment
Know the answer?
Add Answer to:
Describe one of the recent incidents that you may have come across (newspaper articles, stories, workplace...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • (DBA Level )Tick the right answer (only 1 is correct): 1.         Which of the following...

    (DBA Level )Tick the right answer (only 1 is correct): 1.         Which of the following does NOT apply to quantitative research? It uses the scientific method It gives rise to less reliable data than qualitative research It aims to describe, explain and predict phenomena Its methods are tighter and more rigorous than in qualitative research 2.         What is the correct ordering of the stages involved in planning research? Formulate the hypothesis, carry out the study, design the study,...

  • you can get this Mining Big Data: Current Status, and Forecast to the Future pdf in the google search. this one is the article by Wei Fan Lab Instructions: Read the articles enclosed with thi...

    you can get this Mining Big Data: Current Status, and Forecast to the Future pdf in the google search. this one is the article by Wei Fan Lab Instructions: Read the articles enclosed with this assignment; Mining Big Data For each article, write a minimum of paragraphs. paragraph should provide you opinion of the article. Paragraphs should be approximately 4-8 sentences each. Do not plagiarize from the articles provided. All work should be your own. Submit your work as a...

  • CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key...

    CASE 17: WATSON’S AMBULATORY EHR TRANSITION Major theme: System acquisition Primary care physicians play a key role in the U.S. health care delivery system. These providers integrate internal and external information with their clinical knowledge to determine the patient’s treatment options. An effective ambulatory electronic health record (EHR) is critical to supply physicians with the information they need to provide quality care and maximize their efficiency. This case involves the decision-making process to replace an inadequate EHR system in a...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Based on, “75 Must Know Statistics about Long-Term Care,” Please discuss four conclusions you can come...

    Based on, “75 Must Know Statistics about Long-Term Care,” Please discuss four conclusions you can come to for the problems that the long term care industry will face in the coming decade. You must include statistics from the article. 75 Must-Know Statistics About Long-Term Care Christine Benz 31 Aug 2017 In my years of speaking to groups of retirees and pre-retirees, I've learned that there are a handful of topics that will send an event completely out of my control....

  • i have the case study question with the answers but i need help to re-write the...

    i have the case study question with the answers but i need help to re-write the answers. please see the attached files Case Study Analysis (CSF3003) Assessment Description and Requirements CLO1: Case Study 1 Ahmad lef home to study master and PhD in Australia. He has fees for the first semester only. After he arrived to Sydney and settled down, he start looking for a part-time job to save money for the next term. Ahmad has some experience on making...

  • use the information in chapter one to complete it ( in case you do not have...

    use the information in chapter one to complete it ( in case you do not have the book, i post a picture). write a few sentences in each box explaining the extent to which the statements in the left column apply to each of the theories. thank you! Themes and theories Constructivism (Piaget) Social constructivism (Vygotsky) Bioecological systems theory (Bronfenbrenner) nta The environment plays an important role in development Innate factors drive development Development follows a smooth continuous path ning...

  • Case 2-9 Racially Charged Language Inhibits Inclusive Cultures Leaving home for the first time and going...

    Case 2-9 Racially Charged Language Inhibits Inclusive Cultures Leaving home for the first time and going off to college is an exciting and stressful time for tens of thousands of students across the U.S. each year. Leaving the familiarity of family, friends, and community behind and entering an often much more diverse community filled with people with different social, political, religious, racial, national, and sexual orientation backgrounds can create challenges. Luckily, there is currently an effort across the United States...

  • ROLE-PLAY EXERCISE On Command Corporation PROCESS You have been assigned a role in the On Command...

    ROLE-PLAY EXERCISE On Command Corporation PROCESS You have been assigned a role in the On Command Corporation case. Please read the general information (Introduction) about the case. Read and understand your role. Your teammates have different roles. Due the situation, you need to work with your team to produce an employee meeting, you have 15 minutes to present the statement and conduct the meeting – see the link attached with information about an employee meeting (you need to create a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT