logo

Hacking the Human: Analysis, Interventions, and Ethical Issues

   

Added on  2023-05-29

17 Pages5764 Words273 Views
Leadership ManagementMaterials Science and Engineering
 | 
 | 
 | 
HACKING THE HUMAN
0
Hacking the Human: Analysis, Interventions, and Ethical Issues_1

HACKING THE HUMAN
1
Table of Contents
Introduction...........................................................................................................................................2
Analysis of the breach...........................................................................................................................2
Proposed interventions.........................................................................................................................6
Behavioural intervention...................................................................................................................7
Procedural intervention.....................................................................................................................8
Encryption technology...................................................................................................................9
Firewall technique.......................................................................................................................10
Cryptography technology............................................................................................................11
Back up employees system regularly...........................................................................................11
Robust technique.........................................................................................................................11
Maintain and update software....................................................................................................11
Ethical and morality issues..................................................................................................................12
Conclusion...........................................................................................................................................13
References...........................................................................................................................................14
Hacking the Human: Analysis, Interventions, and Ethical Issues_2

HACKING THE HUMAN
2
Introduction
Wanna cry is defined as a cyber-attack that is growing very fast in the last few years and
Watson's widgets are suffering from this kind of cybersecurity breach. Brian Watson
founded this organization in the year 1983 but today their sons David and Robert run
this company (Abawajy, 2014). David is a CEO of Watson and Robert is a CTO of Watson
Widgets. The main objective of this report is to analysis the cybersecurity breach and
prevention tools to mitigate the problem of Wanna cry attack, data breach, hacking and
many more. For analysis of given case taxonomies approach will be used because it is a
more effective process that provides a platform to understand the cyber security threats
and attacks and evaluate the key factors that increase the rate of cyber-crimes. In which
mainly Avoidit and Kevin Mitnick’s taxonomies will be used. This report is divided into
the main three parts such as analysis of the breach, proposed interventions, and ethical
and morality issues.
Analysis of the breach
According to the given scenario, Watson Widget is suffering from the Wanna Cry attack
and Robert use robust and resilient backup process to identify the unwanted signals
and links. To analysis this scenario a taxonomies approach is used because it divided
cyber security attacks into major five parts such as attack vector, defence, attack target,
operational impact and informational impact. Kevin Mitnick’s provided their taxonomy
for evaluating the cyber-attacks. According to Kevin Mitnick’s there are major four steps
involved for the identification and evaluation of cyber-attack such as researching,
exploiting trust, developing, trust, using information. The main root concept for given
case education and training issue due to which the problem of ransomware and wanna
cry occurs. Taxonomy is a hierarchical classification system that divides any concept
into numbers of branches and Dewey decimal system is an advanced taxonomy which is
used by libraries to organize their materials. Janice is a key employee of Watson
organization that know every employee and their employees use third-party
applications and access unauthentic servers by which hackers can easily block their
personal accounts (Cherdantseva, et al., 2016). For this scenario, Avoidit taxonomy can
be used that divided the cyber-attack into few sections such as attack vector, defence,
operational impact, attack target and informational impact. The attack vectors identify
Hacking the Human: Analysis, Interventions, and Ethical Issues_3

HACKING THE HUMAN
3
the path and medium used by the hackers and in the given scenario they used the
internet and football league application as a path or medium. Operational impact affects
the performance of the operation and hackers reduced the performance of Watson’s
organization. In the case of defence attackers communicated and linked with the
employee's accounts and effected the information and data of Watson’s employees. The
last point of this taxonomy is attack target where hackers attack the target. For the
given scenario criminals attack on the personal accounts of employees with the help of
football league. Kevin Mitnick also provided their taxonomy and involved major four
steps such as researching, exploiting trust, utilizing information and developing trust.
An attack vector or vendor refers as a technique which is used by the hackers to
produce the unauthentic signals. It is also used to exploit a computer network or device
and also provide a platform to exploits the threats and vulnerabilities in the computer
system. There are many examples of attack vector such as email attachments, chat
room, deception, instant messages, and pop-up windows. In a given scenario, wireless
channels are used to communicate with other and data transfer from one device to
another (Clarke, and Youngstein, 2017). In this given case the main operator is Sam that
hacked the all personal information of employees and transfers into a dark web. He
knows the hacking and identified the admin password by using malware software and
collect payroll information of employees. But in wanna cry attack generally malicious
software is used to control and monitor the personal information of any user.
Moreover, they detect the location and IP address of their computer system after that
they transfer a large number of traffic signals onto their authentic servers (Ehrenfeld,
2017). The problem of Wanna cry ransom ware occur due to lack of security and Jamie
Smith provided their ID card to Sam by which he entered into the organization and
hacked all relevant information. Janice found a USB drive and she put it into their
computer system due to numbers of viruses their computer device has been blocked.
Lack of proper training is a very serious problem because Janice does not know about
virus and malware due to which the problem of Wanna cry has occurred and Watson
stopped their work for one day.
Wanna cry is a part of ransom ware attack that produces high-level traffic signals and
unauthentic servers and attacks on the organization personal networks. In the year
Hacking the Human: Analysis, Interventions, and Ethical Issues_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Hacking the Human: Analysis of a Cyber Security Breach
|20
|6007
|115

Crypto-currencies and Cybercrime
|11
|3351
|115