Cyber Security Breaches: Types, Prevention and Recommendations
Verified
Added on 2023/06/12
|9
|1902
|143
AI Summary
This paper discusses the three major types of cyber security breaches, namely ransomware, phishing, and denial-of-service attack. It also provides steps that organizations can take to prevent these attacks and recommendations for further improvement of security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER SECURITY BREACHES CYBER SECURITY BREACHES Name of the Student: Name of the University: Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CYBER SECURITY BREACHES Introduction The cyber security is the major concern at present. The cyber security includes the security of the system .It deals with the possible threats that can occur to the systems and the possible ways to eliminate these threats (Low,2017). The types of attacks developing as cyber threat are getting more advanced with the advancement of technology (Devare et al.,2016). There are certain kinds of breaches for the cyber security. The variations of threats based on the technology on which they are developed and the way their working in the system. Discussion There are several security threats. However, this paper discusses about the three major threats or cyber security breaches. Ransom ware:Ransom ware is a sub set of malware, were the attackers encrypt the data in the user’s system. In order to decrypt the system data, certain amount of money is demanded (Ilyas, 2015).. The main objective of the ransom ware attackers is to collect money. This can be spread through the malicious links and email attachments. Recent notable ransom ware attack is WannaCry attack. Steps taken by organization to prevent the attack: Steps those can be taken by the organizations to eliminate the threats from ransom ware attack can be divided into to categories- Technical Steps Steps for increasing awareness.
2CYBER SECURITY BREACHES Technical steps: 1.Enhancement of the system protection by implementation of firewall. The use of firewall will prevent unnecessary traffics to enter into the network. 2.Installing browser add on can prevent the pop up blocks to be opened. This can prevent the malicious ransom ware to enter into the system. 3.Deactivation of auto play 4.The system password needs to be strong enough so that it can not be broken . 5.Regular backup of files and disabling the macros. 6.It seems more difficult to prevent the ransom ware spreading at network level. Firewall should partially or fully block the remote Desktop Protocol and other management services which are remote in nature (Petrenko et al.,2018). Types of file extensions those have to be accessed via internet should be controlled. 7.Use of VPN can help to protect against the ransom ware attack by encrypting the online activity. Steps for increasing awareness: 1.Employees and management of the organization should aware of the threats from the unknown suspicious links. 2.Personalized anti span folders in the mail is needed to be maintained. Steps organization can think to take in order to prevent the ransom ware attack: There are some steps those can be taken by organizations to prevent ransom ware, but those steps are ignored. Some of the malicious IP addresses are well known. Organizations can block those IP addresses at initial stage of the system implementation.
3CYBER SECURITY BREACHES Inmanyorganizations,thereisnospecificsoftwarerestrictionpolicy (Brewer,2016). This policy keeps away executable files from running when they are in specific position of the system. Switching of wireless connection, when it is not using by anyone can prevent the threats.However,thispracticeisnotmaintainedbymanyworkersinthe organization. Remote services can be disabled. Phishing:Phishing is a type of technique of cyber crime, where the criminals present the malicious link as a trusted source of information and web page. The users use the link mistaken as a trusted source making the gate way for the malicious program to enter into the system. Recently Qatar along with three other countries have faced the phishing attack. Organizations can take several steps to prevent the phishing attack. Protection against spam: The organizations generally have separate span folder in the email section. Many organizations have the restriction to enter personal information at pop up screen. Organizations make their employee aware about the security threats that come from the sharing personal information, bank statements to the unknown resources. Steps those can be taken by the organization for preventing phishing: The major awareness to prevent phishing should be taken at the personal level. Phishing is type of online identity theft (Berry&Berry,2018). So, the users should aware of the spam mails.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CYBER SECURITY BREACHES The employees of the organization should be aware of the risks those can be occur form the emails which ask for personal information. The computer or the system of the users in the organization should be protected with firewall, antivirus software and anti spyware software. The employees should be made aware of not providing any sensitive information before cross checking of the source asking for the information. Denial-of-service attack: Denial of service attack is a kind of cyber attack that disables the functions of the system for the users. This can be accomplished by the intruders of the system by employing a bunch of host computers to make the invalid requests to the target computer (Kuypers,Maillart & Pate- Cornell,2016). This kind of malpractice can be regarded as security breach. One kind of denial of service attack is distributed denial of service attack where the flow of requests to the target system come fromvarious sources, which makes it impossible to stop the attack by blocking a single source. Recently , many cases of denial of service attacks has been taken place. One of the significant incidents is denial of service attack at Electroneum crypto currency system. Steps for the organization to prevent denial of service attack: Few steps can be taken by the organization in order to prevent the denial of service attack. Implementation of the firewall:The use of web application firewall van prevents denial of service attack (Liska & Gallo,2016). The firewall checks all the incoming packets in the network with respect to the certain security protocol rules. This preventsthe unauthorized traffic to enter into the network.
5CYBER SECURITY BREACHES Identification and differentiation between legitimate and the denial of service attackers: The first step is to identify the attackers and the way to mitigate the damage (Bui, Clemons&Streff,2018). This can be done by activity profiling, which evaluates the average traffic rates. The identification of the denial of service attack helps to determine the attack type in the runway. Throttling and the rate limiting technologies can be deployed to prevent the denial of service attack. These technologies will help to stop all the inbound connections during the denial of service attack. Managing the network architecture:The management of the network architecture is important for the prevention of more sophisticated attack like distributed denial of service attack. Some factors should be kept in mind while designing the network: 1.Servers should be located in different data centers. 2.Data centers should be placed in the different network. 3.Data centers should have diverse paths. 4.The connection between data centers should have no bottleneck or any point of failure. Bandwidth:Some organizations adopt the policy to control the bandwidth in order to absorb large amount of data (Vishwanath,2015).The large bandwidth can resists the attack for the long time and allows the possibility to mitigate the effect. Recommendations for the company those can be taken to prevent the threat: 1.The organizations should have anti denial-of-service attack plan. 2.The organizations should be aware of the peering capacity of the network to make sure that the authorized traffic should not be mixed up with the malicious one.
6CYBER SECURITY BREACHES 3.Companies should divide roles and designations for accessing the networking devices in the organization. Conclusion It can be concluded from the discussion that though there are several threats present for the system, periodic observation and maintaining certain rules and regulations can help to prevent the threats. There are some steps those are taken by the most of the organizations for the protection against threat. However, certain steps can be taken up by organization for further improvement of the security. These steps have been discussed as the recommendations for the organization. References
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7CYBER SECURITY BREACHES Berry, C. T., & Berry, R. L. (2018). An initial assessment of small business risk management approaches for cyber security threats.International Journal of Business Continuity and Risk Management,8(1), 1-10. Brewer,R.(2016).Ransomwareattacks:detection,preventionandcure.Network Security,2016(9), 5-9. Bui, T., Clemons, E., & Streff, K. (2018, January). Introduction to the Minitrack on Information Security and Privacy. InProceedings of the 51st Hawaii International Conference on System Sciences. Devare, A., Shelake, M., Vahadne, V., Kamble, P., & Tamboli, B. (2016). A System for Denial- of-Service Attack Detection Based on Multivariate Correlation Analysis.International Research Journal of Engineering and Technology (IRJET),3(04). Ilyas, M. M. (2015). Cyber security. Kuypers, M. A., Maillart, T., & Pate-Cornell, E. (2016). An empirical analysis of cyber security incidents at a large organization.Department of Management Science and Engineering, StanfordUniversity,SchoolofInformation,UCBerkeley,http://fsi.stanford. edu/sites/default/files/kuypersweis_v7. pdf, accessed July,30. Liska, A., & Gallo, T. (2016). Ransomware: Defending against digital extortion. Low, P. (2017). Insuring against cyber-attacks.Computer Fraud & Security,2017(4), 18-20. Petrenko, A. S., Petrenko, S. A., Makoveichuk, K. A., & Chetyrbok, P. V. (2018, January). Protection model of PCS of subway from attacks type «wanna cry»,«petya» and «bad rabbit» IoT. InYoung Researchers in Electrical and Electronic Engineering (EIConRus), 2018 IEEE Conference of Russian(pp. 945-949). IEEE.
8CYBER SECURITY BREACHES Vishwanath, A. (2015). Examining the distinct antecedents of e-mail habits and its influence on theoutcomesofaphishingattack.JournalofComputer-Mediated Communication,20(5), 570-584.