CYBER SECURITY Cybersecurityreferstoprovidingprotectiontocomputer systems from the damages that can be caused to the software and the hardware system and enforcing restrictions on theft of confidential information [1]. The increasing reliability on the wireless network give rise to security issues that are resolved by cyber security.
CYBER ATTACK Cyber attack also known as computernetworkattackis deliberatelyexploitingthe computernetworksystems. Theattacksmakeuseof malicioussoftwareand disrupt the operating system [2]. Cyberattacksmayinclude unauthorizedaccessto confidentialfilesand financialreports,identity theft,sniffingofpasswords, defacementofcertain websites and many more.
RECENT CYBER ATTACK STATISTICS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CYBER ATTACK AT TARGET STORE CORPORATION Target Store Corporation is a retail giant in United States of America. The company is a part of S&P 500 Index. The Target Corporation faced a huge cyber attack sometime between November and December in the year 2013. Basic threats was in the form of network breaching.
VULNERABILITIES Target Store Corporation became the target for the malware attack as the company is widely spread across the United State and also internationally. Multiple flaws in the network system of Target Corporation. Vulnerabilities in the third-party vendors lead to the breach in the company’s system.
PREVENTIVE MEASURES The preventive measures that the company should take in order to avoid such breaches in future are using strong passwords,putting upfirewall,usingsecuritysoftwareand updatingprogramsataregularbasis, monitoringintrusionandraisingawareness about cyber security and cyber attacks.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References [1]B.Gupta,D.P. Agrawal,and S. Yamaguchi, eds.Handbookofresearchonmodern cryptographic solutions for computer and cyber security. IGI global, 2016. [2]L. Amini,M. Christodorescu, M.A. Cohen, S. Parthasarathy,J.Rao,R.Sailer,D.L.Schales, W.Z. Venema,and O.Verscheure, International Business Machines Corp.Adaptive cyber-security analytics. U.S. Patent 9,032,521, 2015.