Question

Write a 4 to 5 page paper (not including title and reference pages) write-up a scenario...

Write a 4 to 5 page paper (not including title and reference pages) write-up a scenario where you develop a plan to attack a fictitious organization. Use all the phases that in this hacking Methodology course to build your plan.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:-

  1. The Ransom/Cryptolocker Attack - where these viruses work like a Trojan and are often hidden in email attachments. After you open them, it blocks the user from accessing their files on the PC, infecting the entire system. Later on, the users are asked to pay a certain amount of money to decrypttheir drives and get access to the files again.
  2. Email Phishing/Whaling Scams - the CEO or someone at the top hierarchy is targeted here. He/She is asked to give some sensitive information about the credit card or business bank account. Most of the time they manipulate via an email or a link which redirects them to a fake website which seems legitimate to these innocents!
  3. Email Extortion - Here the most influential of the business is asked for money. If they do not do that, they are told that their sex tape or any sensitive information about the company would leak and get viral.
  4. Zero Day Attacks- This is a vulnerability or a flaw that remains within the business’ software security. It is like a hole, where another software is placed and installed so that hackers can get, steal and hack their information and publish them on the internet later.

1 1 10110101110 pa 101 101 1101 11 101 101 110111 101 101110111 101110 1101 101 01- 1 10110101110 d 92b1d 010 COoD1 -10 10101

With all of these red flags, what I want to suggest you prevent from serious effect is: Keeping your security software and browser up to date is a good practice, and do not forget to train your workers, so that they can take precautions earlier in the day, and would avoid being in a bad situation.

First, backup your files on another server, and then take physical backups of critical files from there to a DVD, and put that DVD into a fireproof safe.

Do not hire a remote IT person. Make sure they can show up on site at least once a week to check on things and can be on call as needed. I recently did a ransomware job where my client took backups and had a remote IT staff and by the time they figured out what was wrong the good backups were over-written with the bad ones.

If you have a physical workplace, hire a competent IT person. I am amazed to find out how many good IT people are unemployed when just hiring an experienced admin part-time could have solved lots of problems and saved a lot of money. (good, experienced System administrators are better to have than a “Security Expert” like myself to come in later and clean up)

Have your new competent IT person do an Audit of backups, software (is it vulnerable) and email (will it need an appliance to filter malware and possible spear phishing attacks?).

So, phase 1.

  1. Fire remote person. Hire real IT person who can visit the site at least weekly
  2. Backups. Make them. Keep them on a separate computer. Keep a weekly or monthly backup on hard drive or DVDs in a fireproof safe.
  3. Backup to the Cloud? Sure, Remember the Cloud is a dumb name for “A computer that is someplace else” If you are comfortable with this, then the Cloud offers good protection at a low price.

Phase 2.

  1. Have your new IT person do an audit of old systems, software and hardware. Take their advice on the change and ask your new IT person to start a migration plan if needed.
  2. Have your IT person look into appliances like firewalls and email filters. Spend money on them if needed.
  3. Have a security policy: Both cyber and physical. Paper gets shredded, even un-important paper. Digital Media gets shredded. Old Hard drives get turned into powerful refrigerator magnets. No one installs pirated software, no one picks up DVDs or USB sticks on the floor and no one opens attachments, and no one emails attachments. (Your IT person can make it so its easy to know what is safe to open)

Phase 3.

  1. Maintenance. IT person comes by at least once a week or 5 days a week 40 hours a week, depending on your needs and checks things, talks to people unjams printers, vaccuums servers does Operating system and softeware updates.
  2. IT person tells you and your staff of latest tech and security developments and advises if it is relevant to you or not.
  1. Spread security user awareness among employees. Educate them about the importance of security in today’s business scenario. Security should never be an after thought - it should be built in along with other business processes.
  2. Create policies and enforce them strictly(eg. strong password combinations, anti-virus software must be regularly updated, firewalls must be inspected, VPNs must be used when working remotely, logout from all accounts when signing out)
  3. New vulnerabilities creep in everyday and patches for software should be regularly updated.
  4. Important business emails should be encrypted.
  5. CCTV cameras should be installed at all crucial locations.
  6. Keep yourself updated about the latest in the InfoSec world and always keep a security team to layout the policies and guidelines for the company.

This just lists some of the points that can be done to protect against a cyber attack…

47 views · Answer requested by Alan Taylor

CIOLCOK

Cio Look Magazine, Media & Publication

Answered Oct 23, 2018

CIO

Secure Your Network with Intelligence : Cyber Security

At present, cyber security is playing a vital role in the digital world and it is also known as a standard technology use for the protection of cyber environment of an individual or any organization. It is mainly known for security culture which includes user network, drives, software process, information storage, application security and system support which is directly or indirectly connected to the network. The prime objective of cyber security is to reduce continuously growing cyber risks and cyber threats.

Cyber security technology consists of a collection of tools, policies, security concepts, risk management, actions, and training. The technology tracks protected networks, data security from data attack, along with cyber security and physical security. The core functionality of cyber-security is based on techniques involved protecting information and system from cyber threats.

How Cyber Security came into Existence?

As with the history, cyber security has huge network background with its own findings and technology aspects. In the early 1990s, a research on information security and policy was been introduced where information was in the form of accuracy and based on system awareness. Under 2016 survey, 70% of the organizations in the US were adopted by US Security survey which is comprised of NIFT (National Institute of Standards and Technology) Cyber-security framework.

Origins of Cyber Security Platform

Cyber security is defined as a package of safety solutions which provides major security processes. There are many sectors which are consuming cyber security platform as its major functionality for web service network. The fundamentals of cyber security process are,

  1. Application Security
  2. Information Security
  3. Network Security
  4. Operational Security
  5. Application security is covered with technology that measures the feasibility of the application by finding, fixing and preventing security exposers. There are different techniques which are being used as security platform to emphasize safety at different stages of the application cycle. Application cycle includes different segments such as design, development, deployment, upgrade, and maintenance. The standard of security process is consequently changing and application cycle has also a different process with different standardization.
  6. Information security is a core source of information which is confidential, integrated and easily available. The primary focus of this security process is to the stable data protection while maintaining a focus on efficient policy application. Risk management process is achieved by identifying assets, threat sources, and vulnerabilities and is also followed by the effectiveness of the risk management plan. Information security mainly works on confidential information which is highly entitled to the process.
  7. Network security sets a variety of computer networks, used in both public and private sector. It also includes conducting transactions and build communications among businesses, government agencies, and individuals. All networks are divided into two sections, private network and public network.
  8. Operational security is a process that identifies information which is critical and easy to determine by competitor intelligence. It protects individual piece of data that could be grouped together to give a proper set of information. It includes critical information essential for military commanders, senior leaders, and higher management. The whole process also includes technical and non-technical measures such as, use of email encryption software, taking precautions against spying data and securing confidential information not to be shared on social media platform.

Operational security is a five-step process which assists any organization to specify required information,

  1. Identification of critical information
  2. Analysis of threats
  3. Analysis of Vulnerabilities
  4. Assessment of Risk.

Conclusion

Cyber security is equally important for local, state, and central government as these organizations maintains a huge amount of confidential data and records concerning the country and its citizens. Yet there are many government and commercial organizations that face difficulties in protecting the confidential data due to lack of inadequate secured infrastructure, and lack of security awareness.

Add a comment
Know the answer?
Add Answer to:
Write a 4 to 5 page paper (not including title and reference pages) write-up a scenario...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Write a 2-4 page paper (not including title or reference pages) with your thoughts and opinions...

    Write a 2-4 page paper (not including title or reference pages) with your thoughts and opinions based on what you’ve learned in this class on how the landscape of data privacy will change in the next 50 years as it relates to information systems and knowledge sharing. Include your thoughts on: The role of government in data ethics, management, and security The role of the organization in data ethics, management, and security The role of the individual in having the...

  • For your project for this course, you will write a research paper with a title page,...

    For your project for this course, you will write a research paper with a title page, body of at least 4 full pages (double-spaced), and a bibliography page (for a total of at least 6 pages), that discusses the mechanics of stock option trading. In your paper, you should discuss what puts and calls are, as well as different strategies such as spreads, collars, etc. Describe a scenario where a private investor might find option trading to be a beneficial...

  • Write a paper that is a minimum of 3 full pages (excluding the title and reference...

    Write a paper that is a minimum of 3 full pages (excluding the title and reference pages) which addresses one of following questions: Often size is highly relevant to organizational strategy and structure. Discuss and provide examples about how strategic planning might differ in a large and small organization. Identify key influencing factors that impact management and the strategic planning process in an organization. How are HR processes impacted and how might they support/strengthen the overarching strategic planning processes of...

  • paper for the course project should be a 2-3 page APA paper (not including title page and the reference page) that descr...

    paper for the course project should be a 2-3 page APA paper (not including title page and the reference page) that describes the clinical problem and the following: P: In senior and Adults I: How does consumption of dietary supplements C: compared to those not consuming dietary supplements O: Affect health improvement T: within 90 days Question: seniors and adult (patient population), dietary supplements (intervention) not taking the dietary supplement (comparison) health improvement (outcome) during a 90days period (time)? You...

  • Your paper for the course project should be a 2-3 page APA paper (not including title...

    Your paper for the course project should be a 2-3 page APA paper (not including title page and the reference page) that describes the clinical problem and the following: Reason for choosing this topic (nosocomial Infection) The PICOT question (Is hand washing effective against nosocomial Infection?) Possible integration of the evidenced that you found in clinical practice Methods to evaluate the effectiveness of implementation

  • Your paper for the course project should be a 2-3 page APA paper (not including title...

    Your paper for the course project should be a 2-3 page APA paper (not including title page and the reference page) that describes the clinical problem and the following: You must use three (3) or more relevant sources; to ensure the readings are relevant and current, the selected peer-reviewed article must have been written within the past three (3) years. Reason for choosing this topic (nosocomial Infection) The PICOT question (Is hand washing effective against nosocomial Infection?) Possible integration of...

  • Write a 1-2 page (not including title page or references) paper using a minimum of three...

    Write a 1-2 page (not including title page or references) paper using a minimum of three scholarly references. Include a definition of public health and then select an achievement of the U.S. public health system. Build support for this achievement which includes recent data/outcomes and recommendations for future improvements as pulled from the online library. Some ideas for this assignment could be emergency preparedness, immunizations, infant mortality, safer food and water, tobacco use, etc. Your paper should include: An introduction...

  • Your written assignment for this module should be a 1-2 page paper (not including title page...

    Your written assignment for this module should be a 1-2 page paper (not including title page and reference page) that describes the following: What are the different types of immunities and give an example of each Describe how stress impacts the immunity of a person You should include a minimum of 3 scholarly references. Include a title page, in-text citations, and a reference page in APA format.

  • Write a 2 page paper detailing your scenario and solution. Include a minimum of 2 references....

    Write a 2 page paper detailing your scenario and solution. Include a minimum of 2 references. Identify a current business problem through research. Based on this situation, create a strategic plan to identify the issue, provide a solution to the problem, and associate the scenario to a learning objective from our course. Discuss the importance of the character of the individuals who are executing the plan.

  • Paper We have learned about the theories and characteristics behind the social and market justice systems...

    Paper We have learned about the theories and characteristics behind the social and market justice systems as they relate to health care. Social justice theory assumes that the government is more responsible and efficient in allocating health resources equitably. All, as a basic right, should have equal access to medical care and ability to pay is inconsequential. Health care is a social good rather than an economic good like in the market justice system. Market justice theory assumes that markets...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT