logo

Cyber Security Breaches: Types, Prevention and Recommendations

   

Added on  2023-06-12

9 Pages1902 Words143 Views
Running head: CYBER SECURITY BREACHES
CYBER SECURITY BREACHES
Name of the Student:
Name of the University:
Author Note:
Cyber Security Breaches: Types, Prevention and Recommendations_1
1CYBER SECURITY BREACHES
Introduction
The cyber security is the major concern at present. The cyber security includes the
security of the system .It deals with the possible threats that can occur to the systems and the
possible ways to eliminate these threats (Low,2017). The types of attacks developing as cyber
threat are getting more advanced with the advancement of technology (Devare et al.,2016).
There are certain kinds of breaches for the cyber security. The variations of threats based on the
technology on which they are developed and the way their working in the system.
Discussion
There are several security threats. However, this paper discusses about the three major
threats or cyber security breaches.
Ransom ware: Ransom ware is a sub set of malware, were the attackers encrypt the data in the
user’s system. In order to decrypt the system data, certain amount of money is demanded (Ilyas,
2015).. The main objective of the ransom ware attackers is to collect money. This can be spread
through the malicious links and email attachments. Recent notable ransom ware attack is
WannaCry attack.
Steps taken by organization to prevent the attack:
Steps those can be taken by the organizations to eliminate the threats from ransom ware
attack can be divided into to categories-
Technical Steps
Steps for increasing awareness.
Cyber Security Breaches: Types, Prevention and Recommendations_2
2CYBER SECURITY BREACHES
Technical steps:
1. Enhancement of the system protection by implementation of firewall. The use of
firewall will prevent unnecessary traffics to enter into the network.
2. Installing browser add on can prevent the pop up blocks to be opened. This can
prevent the malicious ransom ware to enter into the system.
3. Deactivation of auto play
4. The system password needs to be strong enough so that it can not be broken .
5. Regular backup of files and disabling the macros.
6. It seems more difficult to prevent the ransom ware spreading at network level.
Firewall should partially or fully block the remote Desktop Protocol and other
management services which are remote in nature (Petrenko et al.,2018). Types
of file extensions those have to be accessed via internet should be controlled.
7. Use of VPN can help to protect against the ransom ware attack by encrypting the
online activity.
Steps for increasing awareness:
1. Employees and management of the organization should aware of the threats from the
unknown suspicious links.
2. Personalized anti span folders in the mail is needed to be maintained.
Steps organization can think to take in order to prevent the ransom ware attack:
There are some steps those can be taken by organizations to prevent ransom ware,
but those steps are ignored.
Some of the malicious IP addresses are well known. Organizations can block
those IP addresses at initial stage of the system implementation.
Cyber Security Breaches: Types, Prevention and Recommendations_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CVE-2017-0144 Vulnerability
|4
|666
|199

Demonstration of a Cyber Security Threat: Ransomware
|19
|815
|500

Security Awareness Training: An Approach
|12
|961
|292

Cyber Threats: Understanding the Various Forms of Cyber-Attacks
|11
|2898
|479

IS Security and Risk Management: Vulnerabilities, Mitigation Strategies and Impact of Human Factors
|14
|3394
|119

Cyber-Security in Shipping Industry: Ransomware and Malware
|9
|1431
|233