Improve cyber security

Assignment Help Computer Network Security
Reference no: EM131533230

To improve cyber security, think like a hacker

The problem

It is examined that many different issues have been noticed over the web. One of the main issues that can be seen is the cyber security issues. There are different attacks on the business all over, and the valuable information and the capital are stolen and that hurts the company at all stages. Here both hackers and the mindsets are discovered over the time. In this case, the details about the cyber attacks have been analyzed. The hacker mindset is to conquer and looks for the opportunity all the time. The main thing that has been analyzed in this case is that the scanning is done, identifies the opportunity, gain the access and then they maintain that access so that no one could enter into the system. Here negativity is there in the mindset of the hackers, and that is needed to be stopped any cost so that the prevention could be done.

Opportunity/solution

As there are a couple of issues that prevails they are needed to be addressed, and the solution is needed to be provided. In this case, I will like to recommend a couple of solutions to the management so that the security lapse could be fulfilled. Here the IT system needs to be triple layered so that the security issues could be reduced at the minimum time. On the other hand the loopholes that are present in needs to be taken care so that best practices could be determined overall. Here it is important to make sure the security is tightened only specific persons should be allowed in the system and the authorization needs to be tight too. Therefore all apects are needed to be taken in control by the management.

second one is

The Vulnerability Economy- Zero Days.
The problem began in fall 2010 when an unknown malware attacked the Iranian unclear program. Stuxnet attacked Iranian uranium enrichment facilities in Natanz. It was a zero-day virus which is new and difficult to detect. I think, this kind of organizations should have very strong anti-virus and firewalls. Unlike the normal programs, unclear programs could be targeted due to their importance.

Billon Beresford worked on this problem to discover its root. He purchased S7s from Siemens but Stuxnet also attacked Siemens. After 2 months, he found that the vulnerabilities impacted multiple lines of Siemens.S7. He could sell the vulnerabilities, but he did not. Someone in Beresford's position does not necessarily have to give away his discovery. Another possibility hangs in the air: He could sell the vulnerabilities. For Beresford, selling his wares might be more difficult than it appears. The market for Zero-Days is not transparent: much of the buying and selling happens in information settings and underground.

In my onion, Beresford better to sell his discovery because there are another guys looking for what Beresford is looking for and they may discover vulnerabilities. Also, what is Siemens releases a new upgrade or update for its products and avoids the vulnerabilities.

Reference no: EM131533230

Questions Cloud

View the 1980s public service announcement : View the 1980s public service announcement "This is Your Brain on Drugs". Explain why you feel this advertising campaign was or was not effective.
Why are incidental costs igored in inventory costing : Use LCM applied separately to the following individual items to compute ending inventory
Public-private partnership : Using your own words, define and describe the terms in at least 2-3 sentences
Describe features or basic advantages technology will have : Describe the features, capabilities, or basic advantages this technology will have over its predecessor. Predict the first form of technology to be phased.
Improve cyber security : what is Siemens releases a new upgrade or update for its products and avoids the vulnerabilities.
Present value of an annuity : If Pistol and Polly end up living for 15 years on their $750,000, how much could they spend each year?
Compute ending inventory using the fifo periodic system : A company reports the following beginning inventory and purchases, and it ends the period with 30 units in inventory.
Future value of monthly investments : Polly Pete is contributing $100 per month from her paycheck into her retirement account at work. She is earning 6% on the investment.
What is explanatory and response variable : a) What is explanatory and response variable? b) Is this an experimental study or an experiment? Explain why?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Assignment on data warehouses and network infrastructure

Imagine that you are an IT organizational leader in a mid-sized company. Comprise a justifiable argument for the use of data warehouses, data centers, and data marts in order to support for business intelligence (BI) within the organizational stru..

  Why is a rootkit more dangerous than a run-of-the-mill piece

CSIS 343- Why is a rootkit more dangerous than a run-of-the-mill piece of malware? Why is detection of a rootkit more difficult than detection of run-of-the-mill malware?

  Identify and evaluate strategies for crisis management

Identify and evaluate strategies for crisis management. Your paper should focus on the information technology perspective in terms of crisis management.

  Malware introductions to the network

Determine the best practices that should be implemented by the security department to help reduce the risks of malware introductions to the network. Propose what users and systems administrators should do when a potential infection has been suspec..

  Produce a literature review paper

To remain competitive, the company has a strategy to produce reviews covering state-of-the-art research in the field of Digital Forensics and Incident Response.

  Chunks of code to give secure-reliable computing environment

How are many chunks of code from many organizations really going to work together to provide a secure and reliable computing environment?

  What is the new technology

What is the new technology - what does it do and what are the special features it has and when is it coming out in the market and how much will it cost?

  Attributes of company organizational culture

Some attributes of a corporation's organizational culture are so obvious that even an independent observer can feel them. Provide an example of such an observation and describe what cultural phenomenon it defines.

  Explain the steps you would use to diagnose and repair

Explain the steps you would use to diagnose, and repair if necessary, spyware on the customer's computer. Also, add how you would safeguard the children from uninvited material showing up on the internet.

  Describe and assess impact of these devices on newspaper

Personal data assistants (PDAs), iPads, and e-Readers have the capability to wirelessly connect to online stores so that their users can purchase books, music, games,read e-Books, read the news, and perform a myriad of other tasks

  What are the risks of implementing this technique

list one way to prevent malware from executing in Windows from directories that are not normally used for executables. What are the risks of implementing this technique?

  Communicate together securely

There are two offices in different locations that must communicate together securely.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd