Week 7 - Computer Network Defense INSTRUCTIONS: READ CAREFULLY. Read and review the article at the...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Week 7 - Computer Network Defense INSTRUCTIONS: READ CAREFULLY. Read and review the article at the end of this assignment BEFORE starting the exercise. Next, find a current news story or video that involves "cybersecurity." Answer the questions below and cite your sources. Note: This is a "fillable" pdf file. Please use Adobe Acrobat Reader or similar to open it. Save it with your name then upload the completed file. Grade Points: Points per cell block = 6.25. 1. What is the name of the news story or video? Provide link. 2. Is this a story or video about software, hardware, or human behavior? 3. What computer network defense concepts are involved? 4. Briefly discuss the questions from each of the categories below: A. Category-Attack or breach: Who was the attacker, what system were they attacking, and where was the vulnerability in that system? What could have prevented this from occurring? What do you suppose were the attackers' goals? Could the attacker's goals have been anticipated ahead of time? What could be done in the future to prevent similar breaches or attacks? B. Category-Security innovation (technique/mechanism/practice): Who or what innovation was used as a defense against the attack? What does the innovation protect? Do you see any limitations or weaknesses in the innovation? C. Category-Human Behavior: What is the nature of the behavior and how does it relate to network defense? Is this behavior something that could be passed to others through training, writing, or video demonstration? Are there any downsides to using this behavior? 5. What did you learn from this news story or video? Be specific. 6. What impact does the reported event have locally, regionally, or universally? READ/REVIEW THE ARTICLE BELOW Security Breach Attackers can initiate different types of security breaches. Here are three big ones. 1. Viruses, spyware, and other malware - Cybercriminals often use malicious software to break in to protected networks. Viruses, spyware, and other types of malware often arrive by email or from downloads from the internet. 2. Impersonation of an organization - Cybercriminals sometimes can create a gap in security by sending a bogus, but convincing email to an employee of an organization. The email is made to appear like it's from an executive with an urgent request for, say, employment records, log-in information, or other sensitive data. Eager to fill the request, the employee may email back the information - putting it in the hands of cybercriminals. 3. Denial of service (DDoS) attacks - A denial-of-service attack is capable of crashing website can make a website or a computer- unav by flooding it with traffic. DDoS attacks are considered security breaches because they can overwhelm an organization's security devices and its ability to do business. DDoS attacks often target government or financial websites. The motive can be activism, revenge, or extortion. During an attack, anyone who has legitimate business with an organization like you will be unable to access the website. Security Innovations As technology is advancing rapidly, the IT sector and computer security are becoming more fragile and prone to risks and threats. Going much beyond their regular activities, the attackers are innovating their approach to steal much complex data and information. Right from credentials to misconfiguring cloud data, cyber security attacks are making life tough for people in the IT sector. The vendor and regulatory landscape too have seen major changes in recent times. The European Union has been imposing vigorous data privacy regulations since 2018, while California will do the same since January 2020. Experts estimate that IT specialists will be aware of most of the Page 3 of 4 vulnerabilities that will take place in 2020 and that organizations must focus on fixing these known vulnerabilities. Human-Based Cyber Defense Large-scale studies such as IBM's 2014 Cyber Security Intelligence Index reveal that 95% of all security breaches are the result of human error. This is well-understood by today's cyber attackers, who know that people are the weakest link in cybersecurity. Security breaches and compromises of information occur and result in damage to the agency, organization or business. It happens to the best and brightest; the organizations with the newest tools and the best security products and technologies, and the smartest security engineers. We implement frameworks, use encryption, control access, authenticate users, deploy patches, and even detect malware. And we still have breaches. Why? After performing numerous security assessments and responding to a myriad of incidents, we've learned that despite all of the frameworks, policies, processes, and technologies, our enterprises are designed, implemented and used by humans. And humans are the one type of asset in the enterprise, unlike hardware and software, that make mistakes. More often than not, human errors, either accidental or deliberate, are the cause of security breaches. To address this requires a multi-pronged approach we call Human-Based Cyber Defense. Week 7 - Computer Network Defense INSTRUCTIONS: READ CAREFULLY. Read and review the article at the end of this assignment BEFORE starting the exercise. Next, find a current news story or video that involves "cybersecurity." Answer the questions below and cite your sources. Note: This is a "fillable" pdf file. Please use Adobe Acrobat Reader or similar to open it. Save it with your name then upload the completed file. Grade Points: Points per cell block = 6.25. 1. What is the name of the news story or video? Provide link. 2. Is this a story or video about software, hardware, or human behavior? 3. What computer network defense concepts are involved? 4. Briefly discuss the questions from each of the categories below: A. Category-Attack or breach: Who was the attacker, what system were they attacking, and where was the vulnerability in that system? What could have prevented this from occurring? What do you suppose were the attackers' goals? Could the attacker's goals have been anticipated ahead of time? What could be done in the future to prevent similar breaches or attacks? B. Category-Security innovation (technique/mechanism/practice): Who or what innovation was used as a defense against the attack? What does the innovation protect? Do you see any limitations or weaknesses in the innovation? C. Category-Human Behavior: What is the nature of the behavior and how does it relate to network defense? Is this behavior something that could be passed to others through training, writing, or video demonstration? Are there any downsides to using this behavior? 5. What did you learn from this news story or video? Be specific. 6. What impact does the reported event have locally, regionally, or universally? READ/REVIEW THE ARTICLE BELOW Security Breach Attackers can initiate different types of security breaches. Here are three big ones. 1. Viruses, spyware, and other malware - Cybercriminals often use malicious software to break in to protected networks. Viruses, spyware, and other types of malware often arrive by email or from downloads from the internet. 2. Impersonation of an organization - Cybercriminals sometimes can create a gap in security by sending a bogus, but convincing email to an employee of an organization. The email is made to appear like it's from an executive with an urgent request for, say, employment records, log-in information, or other sensitive data. Eager to fill the request, the employee may email back the information - putting it in the hands of cybercriminals. 3. Denial of service (DDoS) attacks - A denial-of-service attack is capable of crashing website can make a website or a computer- unav by flooding it with traffic. DDoS attacks are considered security breaches because they can overwhelm an organization's security devices and its ability to do business. DDoS attacks often target government or financial websites. The motive can be activism, revenge, or extortion. During an attack, anyone who has legitimate business with an organization like you will be unable to access the website. Security Innovations As technology is advancing rapidly, the IT sector and computer security are becoming more fragile and prone to risks and threats. Going much beyond their regular activities, the attackers are innovating their approach to steal much complex data and information. Right from credentials to misconfiguring cloud data, cyber security attacks are making life tough for people in the IT sector. The vendor and regulatory landscape too have seen major changes in recent times. The European Union has been imposing vigorous data privacy regulations since 2018, while California will do the same since January 2020. Experts estimate that IT specialists will be aware of most of the Page 3 of 4 vulnerabilities that will take place in 2020 and that organizations must focus on fixing these known vulnerabilities. Human-Based Cyber Defense Large-scale studies such as IBM's 2014 Cyber Security Intelligence Index reveal that 95% of all security breaches are the result of human error. This is well-understood by today's cyber attackers, who know that people are the weakest link in cybersecurity. Security breaches and compromises of information occur and result in damage to the agency, organization or business. It happens to the best and brightest; the organizations with the newest tools and the best security products and technologies, and the smartest security engineers. We implement frameworks, use encryption, control access, authenticate users, deploy patches, and even detect malware. And we still have breaches. Why? After performing numerous security assessments and responding to a myriad of incidents, we've learned that despite all of the frameworks, policies, processes, and technologies, our enterprises are designed, implemented and used by humans. And humans are the one type of asset in the enterprise, unlike hardware and software, that make mistakes. More often than not, human errors, either accidental or deliberate, are the cause of security breaches. To address this requires a multi-pronged approach we call Human-Based Cyber Defense.
Expert Answer:
Related Book For
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill
Posted Date:
Students also viewed these computer network questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Let A, B be sets. Define: (a) the Cartesian product (A B) (b) the set of relations R between A and B (c) the identity relation A on the set A [3 marks] Suppose S, T are relations between A and B, and...
-
Match each of the following energy band structures with the type of material it represents. Show Work A B C Empty conduction band Band gap Filled valence band Empty conduction band Band gap Filled...
-
Soccer player #1 is 8.6 m from the goal (see the drawing). If she kicks the ball directly into the net, the ball has a displacement labeled A(vector). If, on the other hand, she first kicks it to...
-
Describe at least two distinct benefits that money markets offer to their participants.
-
The magnitude of the magnetic field in a magnetic resonance imaging (MRI) machine can be as great as \(B=3.0 \mathrm{~T}\). Under normal circumstances, this field cannot be shut off by just flipping...
-
An analysis of the transactions made by Mark Kotsay & Co., a certified public accounting firm, for the month of August is shown below. The expenses were $650 for rent, $4,800 for salaries and wages,...
-
Write the SOP Boolean expressions for the 7 outputs. [ 3 . 5 marks ]
-
James Silva is a management accountant at Kleebler - Olson, where he is in charge of their investment portfolio. James worked with a data scientist to develop a model that predicts how a given loan...
-
This question is to be considered independently of all other questions relating to Hinsey Corporation. Refer to the original data when answering this question. The marketing manager believes that an...
-
Write the equations and sketch the diagram of a SIR model where: i) natural births and deaths are taken into account, ii) being cured provides immunity, iii) one can die from this disease, iv) on...
-
Let F(x) = =1 tan (x-1) x < 1 sin (x 1) 1 x Find lim F(x). x+1+ lim F(x) = x+1+
-
Assume that if Cat and Joe go to Bullarama, there is a 35% chance they will have no onsite competitors and the net income would be $967, a 45% chance they will have one onsite competitor and the net...
-
What are the objectives and functions of memory management in operating systems?
-
Outline the objectives and functions of memory management in operating systems. Compare and contrast the physical address space with the virtual address space as they relate to different memory...
-
The R&D group of a major public utility company has identified eight possible projects. A net present value analysis has computed: (1) the expected revenue for each project if it is successful,...
-
Explain five different cases of income exempt from tax with clear examples.
-
The following additional information is available for the Dr. Ivan and Irene Incisor family from Chapters 1-4. Ivan and Irene paid the following in 2012 (all by check or can otherwise be...
-
Jason and Mary Wells, friends of yours, were married on December 30, 2012. They know you are studying taxes and have come to you with a question concerning their filing status. Jason and Mary would...
-
Frederick (Freddy) Freeweights (age 42) owns and operates a health club called ''Treadmills West.'' The business is located at 4321 Arnold Street, Alpine, CA 91901. Freddy had the following income...
-
Can the displacement of a persons trip be zero, yet the distance involved in the trip is nonzero? How about the reverse situation? Explain.
-
Speed is the magnitude of velocity. Is average speed the magnitude of average velocity? Explain.
-
The average velocity of a jogger on a straight track is computed to be +5 km/h. Is it possible for the joggers instantaneous velocity to be negative at any time during the jog? Explain.
The Feynman Lectures On Physics Quantum Mechanics Vol III 1st Edition - ISBN: 0465040837 - Free Book
Study smarter with the SolutionInn App