Categories
Uncategorized

disaster recovery 52

Discussion Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was…

Discussion
Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability has been controlled? If not, what mechanisms were in place to protect against the intrusion.
Note:-
Read and respond to at least two (2) of your classmates†posts. In your response to your classmates, consider comparing your articles to those of your classmates. Below are additional suggestions on how to respond to your classmates†discussions:
· Ask a probing question, substantiated with additional background information, evidence or research.
· Share an insight from having read your colleagues†postings, synthesizing the information to provide new perspectives.
· Offer and support an alternative perspective using readings from the classroom or from your own research.
· Validate an idea with your own experience and additional research.
· Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.
· Expand on your colleagues†postings by providing additional insights or contrasting perspectives based on readings and evidence.
Reply to first topic:-
The target of Network or System Intrusion
In this topic, we are discussing the person, school or company has been targeted towards the network or system intrusion. In the network or system intrusion, the main purpose of the systems intrusion is to detect the negative activity in a wired connection of a network. In order to solve this network intrusions or issues in any school or company, first of all, we need to take care of the certain things that have been held in the organization. In the intrusion primary stage, we have to identify the nation or statewide attacker in order to take that the time out has been understanding. Before to understand the target actually, we need to use the network properly. The hackers and attackers are sharpening their negative skills day by day by using the latest technology resources (Snapp, 2017).
Information That is Targeted
In some cases, we can observe that the network may be authorized or unauthorized. Based on network type the information and data can be stored in a particular system to give security. Mostly, we all know that the network may be any type such as either it will be wired or wireless. With developing technology, in our daily life, we are seeing a lot of changes. In order to spend time for the process of learning, we need to use some of the security functionalities in available devices or systems to find out the vulnerabilities that can exploit the target. The attackers or defenders, in any situation they can stop sending the intrusion by investing the time to understand it was necessary.
Protecting the Intrusion
According to the network theory, we can notice that to protect the data and information stored in proper machinery. In a school or company, the management has to take initiation for the proper functionality in the networks or systems without intrusion. At the initial stages while organizing the network we have to take care of some issues such as scanning and perform the research on the important people in the organization and get to know about their email Idâ€s that are being associated to the target. To get the network details they will be found through an open source data or either any data that is related to that organization(Ashoor, 2011).
Reply 2 :-
Introduction:
A cyberattack is a malicious and deliberate attempt by an individual, group or organization to breach the information system of another individual or organization. Usually, the attacker seeks some type of benefit from disrupting the victimâ€s network.
Equifax attack:
One of the most glaring security intrusions in Information technology affecting the consumers at large can be pinpointed to the Equifax cyber security breach/intrusion. Equifax being one of the major consumer credit reporting agencies ruling the country holds a lot of vital information on consumers such as their SSN, Bank account details, Residential address, medical records and so on. Equifax declared that hackers had gained access to the company data via their website and now information of over 143 million US Consumers was leaked. The thieves got away with vital information like the SSN numbers, DL & Medical records, Bank account information, residential and other personal details.
The attack on the company is one of the largest risks to the exposure of sensitive information in recent years, and this is the third major cybersecurity threat for the agency since 2015.
Equifax, based out of Atlanta, is always on the radar of hackers. Say if the identity thieves want to grab all the data required to do the most damage or commit a heist, they would head straight to the major credit reporting agencies.
Criminals gained access to certain files in the companyâ€s system from mid-May to July by exploiting a weak point in website software and that the company stated that it discovered the intrusion on July 29 and has since then found no evidence of unauthorized activity on its main consumer or commercial credit reporting databases.
In addition to the other material, hackers were also able to retrieve names, birth dates and addresses. Vital statistics from the incident convey Credit card numbers of around 209,000 consumers were stolen, while documents with personal information used in disputes for 182,000 people were also taken.
Thieves were able to siphon off personal information like the keys that unlocked consumers medical histories, bank accounts and employee accounts.
How to curtail Cyber Attack Intrusion:
With increasing threat via online information breach, not only Equifax but all business organizations are implementing the below measures:

Training employees in cyber security principles:

Safety measures start from home. The business organization has started training all of its employees on various cyber and online fraud prevention measures and principles.

Install, use and regularly update antivirus and antispyware software on every computer used in your business:

Now a days the infrastructure and networking departments are installing regular anti-virus softwares and conducting system scan to avoid any breach.

Use a firewall for your Internet connection.

This is the most common used practice to safeguard the organizationâ€s IT infrastructure

Download and install software updates for your operating systems and applications as they become available:

By upgrading the software constantly and keeping the system upto date we can ensure system stability and security.

Make backup copies of important business data and information:

Always be prepared for the worst. This having data backups that are extremely helpful in disaster recovery should be in place right from day 1.

Control physical access to your computers and network components:

Only authorized personnel should have access to the system and the vital data in it.

Secure your Wi-Fi networks. If you have a Wi-Fi network for your workplace make sure it is secure and hidden:

Having a password for the wifi and giving it out to only those who are supposed to access it can also help in curtailing malpractices.

Require individual user accounts for each employee:

All employees should have an individual login ID and password so their actions can easily be tracked.

Limit employee access to data and information and limit authority to install software:

We can encrypt the important information so that it is accessible to only those who need it.

Regularly change passwords:

Passwords should be changed on a regular basis. If possible single sign on needs be implemented.
 
Are you looking for a similar assignment? Order now for an Amazing Discount! Use Discount Code “Newclient” for a 15% Discount!

disaster recovery 52 .

 

Leave a Reply

Your email address will not be published. Required fields are marked *