Hacking the Human: Analysis, Interventions, and Ethical Issues
VerifiedAdded on 2023/05/29
|17
|5764
|273
AI Summary
This report analyzes the Wanna Cry cyber-attack on Watson Widgets and proposes interventions to prevent future attacks. It also discusses ethical and morality issues related to cyber security. The report covers taxonomies, attack vectors, defence, operational impact, attack target, and informational impact. The proposed interventions include behavioural and procedural interventions, encryption technology, firewall technique, cryptography technology, and more. The report also highlights the importance of training and education for employees and the need for security policies.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
HACKING THE HUMAN
0
Hacking the human
0
Hacking the human
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
HACKING THE HUMAN
1
Table of Contents
Introduction...........................................................................................................................................2
Analysis of the breach...........................................................................................................................2
Proposed interventions.........................................................................................................................6
Behavioural intervention...................................................................................................................7
Procedural intervention.....................................................................................................................8
Encryption technology...................................................................................................................9
Firewall technique.......................................................................................................................10
Cryptography technology............................................................................................................11
Back up employees system regularly...........................................................................................11
Robust technique.........................................................................................................................11
Maintain and update software....................................................................................................11
Ethical and morality issues..................................................................................................................12
Conclusion...........................................................................................................................................13
References...........................................................................................................................................14
1
Table of Contents
Introduction...........................................................................................................................................2
Analysis of the breach...........................................................................................................................2
Proposed interventions.........................................................................................................................6
Behavioural intervention...................................................................................................................7
Procedural intervention.....................................................................................................................8
Encryption technology...................................................................................................................9
Firewall technique.......................................................................................................................10
Cryptography technology............................................................................................................11
Back up employees system regularly...........................................................................................11
Robust technique.........................................................................................................................11
Maintain and update software....................................................................................................11
Ethical and morality issues..................................................................................................................12
Conclusion...........................................................................................................................................13
References...........................................................................................................................................14
HACKING THE HUMAN
2
Introduction
Wanna cry is defined as a cyber-attack that is growing very fast in the last few years and
Watson's widgets are suffering from this kind of cybersecurity breach. Brian Watson
founded this organization in the year 1983 but today their sons David and Robert run
this company (Abawajy, 2014). David is a CEO of Watson and Robert is a CTO of Watson
Widgets. The main objective of this report is to analysis the cybersecurity breach and
prevention tools to mitigate the problem of Wanna cry attack, data breach, hacking and
many more. For analysis of given case taxonomies approach will be used because it is a
more effective process that provides a platform to understand the cyber security threats
and attacks and evaluate the key factors that increase the rate of cyber-crimes. In which
mainly Avoidit and Kevin Mitnick’s taxonomies will be used. This report is divided into
the main three parts such as analysis of the breach, proposed interventions, and ethical
and morality issues.
Analysis of the breach
According to the given scenario, Watson Widget is suffering from the Wanna Cry attack
and Robert use robust and resilient backup process to identify the unwanted signals
and links. To analysis this scenario a taxonomies approach is used because it divided
cyber security attacks into major five parts such as attack vector, defence, attack target,
operational impact and informational impact. Kevin Mitnick’s provided their taxonomy
for evaluating the cyber-attacks. According to Kevin Mitnick’s there are major four steps
involved for the identification and evaluation of cyber-attack such as researching,
exploiting trust, developing, trust, using information. The main root concept for given
case education and training issue due to which the problem of ransomware and wanna
cry occurs. Taxonomy is a hierarchical classification system that divides any concept
into numbers of branches and Dewey decimal system is an advanced taxonomy which is
used by libraries to organize their materials. Janice is a key employee of Watson
organization that know every employee and their employees use third-party
applications and access unauthentic servers by which hackers can easily block their
personal accounts (Cherdantseva, et al., 2016). For this scenario, Avoidit taxonomy can
be used that divided the cyber-attack into few sections such as attack vector, defence,
operational impact, attack target and informational impact. The attack vectors identify
2
Introduction
Wanna cry is defined as a cyber-attack that is growing very fast in the last few years and
Watson's widgets are suffering from this kind of cybersecurity breach. Brian Watson
founded this organization in the year 1983 but today their sons David and Robert run
this company (Abawajy, 2014). David is a CEO of Watson and Robert is a CTO of Watson
Widgets. The main objective of this report is to analysis the cybersecurity breach and
prevention tools to mitigate the problem of Wanna cry attack, data breach, hacking and
many more. For analysis of given case taxonomies approach will be used because it is a
more effective process that provides a platform to understand the cyber security threats
and attacks and evaluate the key factors that increase the rate of cyber-crimes. In which
mainly Avoidit and Kevin Mitnick’s taxonomies will be used. This report is divided into
the main three parts such as analysis of the breach, proposed interventions, and ethical
and morality issues.
Analysis of the breach
According to the given scenario, Watson Widget is suffering from the Wanna Cry attack
and Robert use robust and resilient backup process to identify the unwanted signals
and links. To analysis this scenario a taxonomies approach is used because it divided
cyber security attacks into major five parts such as attack vector, defence, attack target,
operational impact and informational impact. Kevin Mitnick’s provided their taxonomy
for evaluating the cyber-attacks. According to Kevin Mitnick’s there are major four steps
involved for the identification and evaluation of cyber-attack such as researching,
exploiting trust, developing, trust, using information. The main root concept for given
case education and training issue due to which the problem of ransomware and wanna
cry occurs. Taxonomy is a hierarchical classification system that divides any concept
into numbers of branches and Dewey decimal system is an advanced taxonomy which is
used by libraries to organize their materials. Janice is a key employee of Watson
organization that know every employee and their employees use third-party
applications and access unauthentic servers by which hackers can easily block their
personal accounts (Cherdantseva, et al., 2016). For this scenario, Avoidit taxonomy can
be used that divided the cyber-attack into few sections such as attack vector, defence,
operational impact, attack target and informational impact. The attack vectors identify
HACKING THE HUMAN
3
the path and medium used by the hackers and in the given scenario they used the
internet and football league application as a path or medium. Operational impact affects
the performance of the operation and hackers reduced the performance of Watson’s
organization. In the case of defence attackers communicated and linked with the
employee's accounts and effected the information and data of Watson’s employees. The
last point of this taxonomy is attack target where hackers attack the target. For the
given scenario criminals attack on the personal accounts of employees with the help of
football league. Kevin Mitnick also provided their taxonomy and involved major four
steps such as researching, exploiting trust, utilizing information and developing trust.
An attack vector or vendor refers as a technique which is used by the hackers to
produce the unauthentic signals. It is also used to exploit a computer network or device
and also provide a platform to exploits the threats and vulnerabilities in the computer
system. There are many examples of attack vector such as email attachments, chat
room, deception, instant messages, and pop-up windows. In a given scenario, wireless
channels are used to communicate with other and data transfer from one device to
another (Clarke, and Youngstein, 2017). In this given case the main operator is Sam that
hacked the all personal information of employees and transfers into a dark web. He
knows the hacking and identified the admin password by using malware software and
collect payroll information of employees. But in wanna cry attack generally malicious
software is used to control and monitor the personal information of any user.
Moreover, they detect the location and IP address of their computer system after that
they transfer a large number of traffic signals onto their authentic servers (Ehrenfeld,
2017). The problem of Wanna cry ransom ware occur due to lack of security and Jamie
Smith provided their ID card to Sam by which he entered into the organization and
hacked all relevant information. Janice found a USB drive and she put it into their
computer system due to numbers of viruses their computer device has been blocked.
Lack of proper training is a very serious problem because Janice does not know about
virus and malware due to which the problem of Wanna cry has occurred and Watson
stopped their work for one day.
Wanna cry is a part of ransom ware attack that produces high-level traffic signals and
unauthentic servers and attacks on the organization personal networks. In the year
3
the path and medium used by the hackers and in the given scenario they used the
internet and football league application as a path or medium. Operational impact affects
the performance of the operation and hackers reduced the performance of Watson’s
organization. In the case of defence attackers communicated and linked with the
employee's accounts and effected the information and data of Watson’s employees. The
last point of this taxonomy is attack target where hackers attack the target. For the
given scenario criminals attack on the personal accounts of employees with the help of
football league. Kevin Mitnick also provided their taxonomy and involved major four
steps such as researching, exploiting trust, utilizing information and developing trust.
An attack vector or vendor refers as a technique which is used by the hackers to
produce the unauthentic signals. It is also used to exploit a computer network or device
and also provide a platform to exploits the threats and vulnerabilities in the computer
system. There are many examples of attack vector such as email attachments, chat
room, deception, instant messages, and pop-up windows. In a given scenario, wireless
channels are used to communicate with other and data transfer from one device to
another (Clarke, and Youngstein, 2017). In this given case the main operator is Sam that
hacked the all personal information of employees and transfers into a dark web. He
knows the hacking and identified the admin password by using malware software and
collect payroll information of employees. But in wanna cry attack generally malicious
software is used to control and monitor the personal information of any user.
Moreover, they detect the location and IP address of their computer system after that
they transfer a large number of traffic signals onto their authentic servers (Ehrenfeld,
2017). The problem of Wanna cry ransom ware occur due to lack of security and Jamie
Smith provided their ID card to Sam by which he entered into the organization and
hacked all relevant information. Janice found a USB drive and she put it into their
computer system due to numbers of viruses their computer device has been blocked.
Lack of proper training is a very serious problem because Janice does not know about
virus and malware due to which the problem of Wanna cry has occurred and Watson
stopped their work for one day.
Wanna cry is a part of ransom ware attack that produces high-level traffic signals and
unauthentic servers and attacks on the organization personal networks. In the year
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
HACKING THE HUMAN
4
2017 the rate of Wanna cry has increased by 30% and around thousands of computers
are hacked by attackers. Generally, they send the spam emails and websites links to the
mobile devices of users after that users click on these links by which hackers access
their accounts and encrypt all personal information. Watson organization faced this
kind of cyber security breach because their few employees play football league which is
developed by the malicious software and hackers detect the admin passwords.
Mainly, Wanna Cry target computer networks and their operating system by encryption
the authentic servers and demand money to restore their personal details. There are
mainly four types of wanna cry attack occurs in computer networks, for example, wanna
crypt, wanna decryptor 2.0, wanna Decryptor and wanna Crypt0r 2.0. It is observed that
most the consumers use third party applications which are developed by hackers and
the workers of Robert Company use few online websites to play the game. Due to which
the whole company faced the problem of Wanna Cry and most hackers block the
personal data files and bank details of users. There are main three key components used
in this attack which are following
An application that encrypts and decrypt the user’s data
A copy of Tor
Files that contain the encryption keys
It is observed that Watson Widget used taxonomy and framework approaches to
identify the unauthorized signals and data. With the help of these approaches, David
and Robert can easily analysis the data breach issues and key factors that increase this
kind of cyber-attacks. In which Sam used the ID card of Jamie smith and hacked the all
personal details of employees and after that, he sends these details on a dark web. When
Janice communicated with this guy then he said David has been hired me in this
organization and after the one week, Jamie posts a message on Facebook and link din.
Due to all these activities, Robert faced the problem of ransom ware attack because
their employees was using and playing Fantasy Football League which is produced by
attackers.
There are main three human weaknesses identified in the given scenario such as Jamie
Smith provided their ID card to Sam due to which he entered into the company and
hacked all personal data. The second one is that Janice put USB drive in their computer
4
2017 the rate of Wanna cry has increased by 30% and around thousands of computers
are hacked by attackers. Generally, they send the spam emails and websites links to the
mobile devices of users after that users click on these links by which hackers access
their accounts and encrypt all personal information. Watson organization faced this
kind of cyber security breach because their few employees play football league which is
developed by the malicious software and hackers detect the admin passwords.
Mainly, Wanna Cry target computer networks and their operating system by encryption
the authentic servers and demand money to restore their personal details. There are
mainly four types of wanna cry attack occurs in computer networks, for example, wanna
crypt, wanna decryptor 2.0, wanna Decryptor and wanna Crypt0r 2.0. It is observed that
most the consumers use third party applications which are developed by hackers and
the workers of Robert Company use few online websites to play the game. Due to which
the whole company faced the problem of Wanna Cry and most hackers block the
personal data files and bank details of users. There are main three key components used
in this attack which are following
An application that encrypts and decrypt the user’s data
A copy of Tor
Files that contain the encryption keys
It is observed that Watson Widget used taxonomy and framework approaches to
identify the unauthorized signals and data. With the help of these approaches, David
and Robert can easily analysis the data breach issues and key factors that increase this
kind of cyber-attacks. In which Sam used the ID card of Jamie smith and hacked the all
personal details of employees and after that, he sends these details on a dark web. When
Janice communicated with this guy then he said David has been hired me in this
organization and after the one week, Jamie posts a message on Facebook and link din.
Due to all these activities, Robert faced the problem of ransom ware attack because
their employees was using and playing Fantasy Football League which is produced by
attackers.
There are main three human weaknesses identified in the given scenario such as Jamie
Smith provided their ID card to Sam due to which he entered into the company and
hacked all personal data. The second one is that Janice put USB drive in their computer
HACKING THE HUMAN
5
without scanning by which numbers of viruses come into their computer networks. The
last one is that their worker was playing Fantasy Football League which is developed by
the criminals in order to detect the personal details of employees. According to the
Kevin Mitnick’s taxonomy employees can easily trust on the third party application like
Fantasy Football League which creates a big problem in the system. Moreover, in the
given scenario the Kevin Mitnick’s taxonomy is applied and evaluated that the third case
(use of Fantasy Football League) was responsible for the ransom ware attack. It is a very
crucial problem for small as well as large business which spreads by emails, browsers,
and other third-party software. It is observed that hacker’s attacks on the old computer
device which is no longer supported Microsoft and if any users use windows 10 and
other latest version they can detect the unauthentic servers and attacks without using
external resources.
To reduce such kind of problem Robert developed various strategies and policies such
as BYOD policy, information security training and education; protect data from hackers,
and use security tools or techniques to handle malware attacks. Recent event identified
that there were some important discrepancies in the stores that were traced to the
Jamie Smith and David and Robert provide a notice period and resignation latter to
Jamie. During the last week, Jamie posted their views on social Media and Sam read all
these posts and communicates with Jamie and provides $ 5000 to Jamie and takes their
identity card for two days. Due to all these things, Sam hacked the pay role information
of the employees and stored all private details of Robert organization. Most of the
attackers in ransom ware send fraud emails and messages to the user’s mobile devices
and employees of Watson use unauthorized websites which are produced by ransom
ware. Generally, ransom ware targets the consumer’s documents, pictures, files, and
other data and use a complex algorithm to encrypt all these information. There are
following components uses in ransom ware attack:
Encryption files
Renamed files
Locked screen
Locked browser
5
without scanning by which numbers of viruses come into their computer networks. The
last one is that their worker was playing Fantasy Football League which is developed by
the criminals in order to detect the personal details of employees. According to the
Kevin Mitnick’s taxonomy employees can easily trust on the third party application like
Fantasy Football League which creates a big problem in the system. Moreover, in the
given scenario the Kevin Mitnick’s taxonomy is applied and evaluated that the third case
(use of Fantasy Football League) was responsible for the ransom ware attack. It is a very
crucial problem for small as well as large business which spreads by emails, browsers,
and other third-party software. It is observed that hacker’s attacks on the old computer
device which is no longer supported Microsoft and if any users use windows 10 and
other latest version they can detect the unauthentic servers and attacks without using
external resources.
To reduce such kind of problem Robert developed various strategies and policies such
as BYOD policy, information security training and education; protect data from hackers,
and use security tools or techniques to handle malware attacks. Recent event identified
that there were some important discrepancies in the stores that were traced to the
Jamie Smith and David and Robert provide a notice period and resignation latter to
Jamie. During the last week, Jamie posted their views on social Media and Sam read all
these posts and communicates with Jamie and provides $ 5000 to Jamie and takes their
identity card for two days. Due to all these things, Sam hacked the pay role information
of the employees and stored all private details of Robert organization. Most of the
attackers in ransom ware send fraud emails and messages to the user’s mobile devices
and employees of Watson use unauthorized websites which are produced by ransom
ware. Generally, ransom ware targets the consumer’s documents, pictures, files, and
other data and use a complex algorithm to encrypt all these information. There are
following components uses in ransom ware attack:
Encryption files
Renamed files
Locked screen
Locked browser
HACKING THE HUMAN
6
If any person identified such kind of attack then they can communicate with
information technology and they can adopt the encryption or cryptography technique.
Robert uses robust technology that identified the spam emails and messages and
provides a notification on the computer screen. But this technique cannot be used to
block malicious traffic and signals due to which hackers can easily access employee’s
computer system and Sam used malware software to detect the admin password.
Training and education both are very serious issues for any organization and it is
identified that the employees of Watson Company do not know about cyber-attacks
because their managers did not provide any training.
To avoid this type of issues David and Robert can hire a cyber-security specialist to
provide proper training to their employees and they should ensure that workers use
only authorized servers and websites. According to recent studies, the use of third-party
applications and websites are growing very fast and most of the workers share their
data or information using malicious software. By which hacker detect the location of
their networks and transfer a large number of traffic signals on the organization
network and encrypt the private details such as account information, important
pictures and documents. When any person leaves the company then the HR team does
not collect their ID cards, for example, Jamie Smith resigned from the post of store
manager due to some reasons but HR team did not take their ID by which Sam entered
into the organization using their ID. So, Robert and David can address this kind of issues
by developing security policies.
Proposed interventions
Today security of data is very complex because the rate of cyber-crimes is growing very
fast and hackers used advanced algorithm to detect the user’s information. Wanna Cry is
a part of cyber-attack which occurs due to lack of security and use on unauthorized
servers. According to the given scenario, few workers of Watson organization used
spam websites and unauthorized links by which hackers detect the network details and
mobile information. After that, they enter into the user personal accounts and use an
encryption algorithm to block all details due to which an encryption messages show on
the screen on a computer (Fovino, Masera, and De Cian, 2009).
6
If any person identified such kind of attack then they can communicate with
information technology and they can adopt the encryption or cryptography technique.
Robert uses robust technology that identified the spam emails and messages and
provides a notification on the computer screen. But this technique cannot be used to
block malicious traffic and signals due to which hackers can easily access employee’s
computer system and Sam used malware software to detect the admin password.
Training and education both are very serious issues for any organization and it is
identified that the employees of Watson Company do not know about cyber-attacks
because their managers did not provide any training.
To avoid this type of issues David and Robert can hire a cyber-security specialist to
provide proper training to their employees and they should ensure that workers use
only authorized servers and websites. According to recent studies, the use of third-party
applications and websites are growing very fast and most of the workers share their
data or information using malicious software. By which hacker detect the location of
their networks and transfer a large number of traffic signals on the organization
network and encrypt the private details such as account information, important
pictures and documents. When any person leaves the company then the HR team does
not collect their ID cards, for example, Jamie Smith resigned from the post of store
manager due to some reasons but HR team did not take their ID by which Sam entered
into the organization using their ID. So, Robert and David can address this kind of issues
by developing security policies.
Proposed interventions
Today security of data is very complex because the rate of cyber-crimes is growing very
fast and hackers used advanced algorithm to detect the user’s information. Wanna Cry is
a part of cyber-attack which occurs due to lack of security and use on unauthorized
servers. According to the given scenario, few workers of Watson organization used
spam websites and unauthorized links by which hackers detect the network details and
mobile information. After that, they enter into the user personal accounts and use an
encryption algorithm to block all details due to which an encryption messages show on
the screen on a computer (Fovino, Masera, and De Cian, 2009).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
HACKING THE HUMAN
7
Therefore, if Robert provides proper training and education program to handle such
kind of attacks then they can save their private details. The main key element of given
case study is Sam that hacked the admin password by using malicious software and
store the payroll information of consumers. Jamie provided their ID card to Sam that
was the very big problem of this organization because they did not collect the ID card of
resigned employees. Due to lack of security Sam entered into the organization and
operate employees computer system if Robert uses a fingerprint scanner or other
biometric recognition system in their company then they can avoid the problem of
uncertainty and hack (Gayle, et al., 2017). In future this organization should design and
implement the security policies and they will adopt the advanced security tools such as
cryptography, robust technique, firewall and antivirus and so on. Moreover, they can
use the backup plans in order to secure personal documents and data.
Behavioural intervention
Behavioural approach is a very common process to mitigate cyber security threats
because the problem of hacking occurs due to human weakness and lack of knowledge.
In the given case, Janice is a key employee of Watson organization but she does not
know about cyber-security due to which their employees use unauthentic websites in
their computer system. Therefore, Robert can produce a security policy for all
employees to access only authorized servers and websites and they can hire an IT
specialist to control the security threats (Gómez-Hernández, et al., 2018). Moreover,
management did not provide any training and education to their employees due to
which they did not understand the problem of hacking and data breach. This is also a
behavioural intervention which impact on the behaviour of the employees and workers.
Jamie Smith resigned from the post of store manager due to discrepancies in the store
and management team did not collect their ID card and other details by which Sam
enter in the organization and access employees accounts. To avoid such kind of problem
Robert and David can change the behaviour of employees by motivating them for cyber-
crimes and they can adopt the biometric technology to control such kind of issues. It is
observed from recent event Janice found a USB drive and she put into their computer
system but due to some viruses and traffic signals their data has been encrypted and a
payment message showed on a computer screen (Gordon, Fairhall, and Landman,
2017). This problem happened due to lack of knowledge because Janice do not know
7
Therefore, if Robert provides proper training and education program to handle such
kind of attacks then they can save their private details. The main key element of given
case study is Sam that hacked the admin password by using malicious software and
store the payroll information of consumers. Jamie provided their ID card to Sam that
was the very big problem of this organization because they did not collect the ID card of
resigned employees. Due to lack of security Sam entered into the organization and
operate employees computer system if Robert uses a fingerprint scanner or other
biometric recognition system in their company then they can avoid the problem of
uncertainty and hack (Gayle, et al., 2017). In future this organization should design and
implement the security policies and they will adopt the advanced security tools such as
cryptography, robust technique, firewall and antivirus and so on. Moreover, they can
use the backup plans in order to secure personal documents and data.
Behavioural intervention
Behavioural approach is a very common process to mitigate cyber security threats
because the problem of hacking occurs due to human weakness and lack of knowledge.
In the given case, Janice is a key employee of Watson organization but she does not
know about cyber-security due to which their employees use unauthentic websites in
their computer system. Therefore, Robert can produce a security policy for all
employees to access only authorized servers and websites and they can hire an IT
specialist to control the security threats (Gómez-Hernández, et al., 2018). Moreover,
management did not provide any training and education to their employees due to
which they did not understand the problem of hacking and data breach. This is also a
behavioural intervention which impact on the behaviour of the employees and workers.
Jamie Smith resigned from the post of store manager due to discrepancies in the store
and management team did not collect their ID card and other details by which Sam
enter in the organization and access employees accounts. To avoid such kind of problem
Robert and David can change the behaviour of employees by motivating them for cyber-
crimes and they can adopt the biometric technology to control such kind of issues. It is
observed from recent event Janice found a USB drive and she put into their computer
system but due to some viruses and traffic signals their data has been encrypted and a
payment message showed on a computer screen (Gordon, Fairhall, and Landman,
2017). This problem happened due to lack of knowledge because Janice do not know
HACKING THE HUMAN
8
about virus and data breach and she put pan drive in their computer. This type of
problem can be reduced if the IT team provide a security tool in employee’s computer
system and employees can learn about cyber-attacks from the internet.
The employees of Watson Widget organization play a football league in their computer
and mobile and they use few websites which are developed by the malware software.
Hackers store the information of their computer and account details for which Robert
can make a security program to motivate their workers regarding cyber-attacks and
ransom ware attack (Hug, and Giampapa, 2012). They can make limited login attempts
for every employee because it is founded that most of the employees access their
accounts in another computer system by which organization data can be leaked.
If any employees play a game or use third-party websites in their computer system then
they can take serious action and produce an advanced algorithm which can detect the
traffic signals and unwanted links. With the help of all these strategies and steps, Robert
and David can control and mitigate the issue of wanna cry ransom ware attack. If they
change the behaviour of employees and workers regarding cybercrimes and other
security issues then they can improve the security of their private data. It is investigated
that hackers share unwanted signals and links to user’s accounts and employees click
on fraud links by which hackers detect all the relevant information like IP address, data
link, admin password and many more. To avoid such kind of issue information and
technology team can produce a strong computer network and they can produce weakly
report to identify which type of websites uses employees.
Procedural intervention
Information and technology developed numbers of advanced technology to mitigate the
problem of ransom ware and other data breaches such as firewall, antivirus software,
encryption technology, cryptography and biometric recognition technique. A recent
study indicated that most of the hacker share a large number of traffic signals on
Watson networks after that they block their computer networks and hack all the private
details. After the hacking process, they communicate with the user from social Media
and demand money to restore back their private details (Jarrett, 2017). To avoid these
kinds of security issues Robert can adopt the advanced security technologies like
encryption and robust. The best behavioural intervention is that the management team
8
about virus and data breach and she put pan drive in their computer. This type of
problem can be reduced if the IT team provide a security tool in employee’s computer
system and employees can learn about cyber-attacks from the internet.
The employees of Watson Widget organization play a football league in their computer
and mobile and they use few websites which are developed by the malware software.
Hackers store the information of their computer and account details for which Robert
can make a security program to motivate their workers regarding cyber-attacks and
ransom ware attack (Hug, and Giampapa, 2012). They can make limited login attempts
for every employee because it is founded that most of the employees access their
accounts in another computer system by which organization data can be leaked.
If any employees play a game or use third-party websites in their computer system then
they can take serious action and produce an advanced algorithm which can detect the
traffic signals and unwanted links. With the help of all these strategies and steps, Robert
and David can control and mitigate the issue of wanna cry ransom ware attack. If they
change the behaviour of employees and workers regarding cybercrimes and other
security issues then they can improve the security of their private data. It is investigated
that hackers share unwanted signals and links to user’s accounts and employees click
on fraud links by which hackers detect all the relevant information like IP address, data
link, admin password and many more. To avoid such kind of issue information and
technology team can produce a strong computer network and they can produce weakly
report to identify which type of websites uses employees.
Procedural intervention
Information and technology developed numbers of advanced technology to mitigate the
problem of ransom ware and other data breaches such as firewall, antivirus software,
encryption technology, cryptography and biometric recognition technique. A recent
study indicated that most of the hacker share a large number of traffic signals on
Watson networks after that they block their computer networks and hack all the private
details. After the hacking process, they communicate with the user from social Media
and demand money to restore back their private details (Jarrett, 2017). To avoid these
kinds of security issues Robert can adopt the advanced security technologies like
encryption and robust. The best behavioural intervention is that the management team
HACKING THE HUMAN
9
of Watson organization can provide complete training and education to their employees
and workers. It can change their behaviour and they can aware of the cyber-attacks and
data breach related issues. The organization can adopt the IT team and conduct a
seminar in order to provide a brief idea about cyber-security tools and techniques.
Moreover, they can collect the opinions of the employees and workers about cyber-
attacks and ensure that they use only authentic servers and secure their data from
friends and other employees. They can adopt the ISA policy for changing the behaviour
of the employees and Kevin Mitnick’s taxonomy evaluated that the developing trust in
the employees is more difficult for which organization can design and implement the
ISA and ISMS policies. By using this taxonomy it is observed that the employee element
is one of the weakest links the cyber-attacks and it is exploited by the hackers. For
which Watson’s Company can use the information security management system to
manage human behaviour and employee’s sensitive data.
Encryption technology
It is one of the most important security plans to avoid the data breach and wanna cry
attack and most of organization use this technique to address cyber-crimes. In which
the signal or information converts into a form of code which is transferred from one
location to another and this code cannot hack by the attackers (Kshetri, and Voas,
2017). At the end of the receiver a decryption process has used that convert this code
into the original form. This technology is very popular because it had the ability to
detect and monitor the unwanted signals and Robert can adopt this technology because
they communicate with their employees and consumers by using wireless technologies.
If any worker shares any file or document then hackers detect their location and read all
data files by which users can lose their privacy for which encryption process can be
used that avoid such type of issue.
Therefore, Watson organization can make a security plan and use this type of
technology because their employees contact with numbers of consumers and they can
protect their conversation and data from hackers. For example, if any employee
transfers a keyword HELLO to another person then encryption converts this
information into a code that is EBIIL which cannot be easily hacked by the attackers and
it secures their private data. Moreover, Robert can identify the traffic signals and
unauthentic servers by using this technology (Mohurle, and Patil, 2017). The main
9
of Watson organization can provide complete training and education to their employees
and workers. It can change their behaviour and they can aware of the cyber-attacks and
data breach related issues. The organization can adopt the IT team and conduct a
seminar in order to provide a brief idea about cyber-security tools and techniques.
Moreover, they can collect the opinions of the employees and workers about cyber-
attacks and ensure that they use only authentic servers and secure their data from
friends and other employees. They can adopt the ISA policy for changing the behaviour
of the employees and Kevin Mitnick’s taxonomy evaluated that the developing trust in
the employees is more difficult for which organization can design and implement the
ISA and ISMS policies. By using this taxonomy it is observed that the employee element
is one of the weakest links the cyber-attacks and it is exploited by the hackers. For
which Watson’s Company can use the information security management system to
manage human behaviour and employee’s sensitive data.
Encryption technology
It is one of the most important security plans to avoid the data breach and wanna cry
attack and most of organization use this technique to address cyber-crimes. In which
the signal or information converts into a form of code which is transferred from one
location to another and this code cannot hack by the attackers (Kshetri, and Voas,
2017). At the end of the receiver a decryption process has used that convert this code
into the original form. This technology is very popular because it had the ability to
detect and monitor the unwanted signals and Robert can adopt this technology because
they communicate with their employees and consumers by using wireless technologies.
If any worker shares any file or document then hackers detect their location and read all
data files by which users can lose their privacy for which encryption process can be
used that avoid such type of issue.
Therefore, Watson organization can make a security plan and use this type of
technology because their employees contact with numbers of consumers and they can
protect their conversation and data from hackers. For example, if any employee
transfers a keyword HELLO to another person then encryption converts this
information into a code that is EBIIL which cannot be easily hacked by the attackers and
it secures their private data. Moreover, Robert can identify the traffic signals and
unauthentic servers by using this technology (Mohurle, and Patil, 2017). The main
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
HACKING THE HUMAN
10
problem occurs with this process is that it is very complex to implement but Watson
organization can use this technique because it is a more effective approach to address
the ransom ware attack.
Firewall technique
Firewall is defined as a security system which is used to monitor and control the
unwanted signals and traffic networks based on security rules. It is a very advanced
technique that has the ability to detect unauthorized servers from computer networks
and secure users private details (Pascariu, BARBU, and Bacivarov, 2017). This technique
produces a barrier between the authentic network and unauthentic server and provides
a platform to mitigate the ransom ware and other cyber-attacks. The David and Robert
produced a large computer network to improve the communication system but they did
not involve any security tool by which they were suffered from the data breach and
wanna cry attack.
If they adopt firewall technique then they can address such kind of cyber security
breach and it also helps to enhance the communication system. There are main two
kinds of firewall used such as network firewalls and host-based firewalls. A network
firewall is used as a filtration process that runs on network hardware but host-based
runs on the host computer systems and control the traffic signals. Watson organization
stores their large amount of data in the computer system so they can use firewall
software to protect their data from cyber-attacks. It provides a virtual barrier that
controls the spam mails and other unauthorized networks and it has the capability to
increase security by controlling computer networks. There are the following task
perform by firewall technology
Validate access
Defend resources
Manage and control network traffic
Act as an intermediary
Identify unwanted signals
In this modern generation, most of the consumers use internet connectivity to transfer
data or information from one location for which they use a third-party application that
10
problem occurs with this process is that it is very complex to implement but Watson
organization can use this technique because it is a more effective approach to address
the ransom ware attack.
Firewall technique
Firewall is defined as a security system which is used to monitor and control the
unwanted signals and traffic networks based on security rules. It is a very advanced
technique that has the ability to detect unauthorized servers from computer networks
and secure users private details (Pascariu, BARBU, and Bacivarov, 2017). This technique
produces a barrier between the authentic network and unauthentic server and provides
a platform to mitigate the ransom ware and other cyber-attacks. The David and Robert
produced a large computer network to improve the communication system but they did
not involve any security tool by which they were suffered from the data breach and
wanna cry attack.
If they adopt firewall technique then they can address such kind of cyber security
breach and it also helps to enhance the communication system. There are main two
kinds of firewall used such as network firewalls and host-based firewalls. A network
firewall is used as a filtration process that runs on network hardware but host-based
runs on the host computer systems and control the traffic signals. Watson organization
stores their large amount of data in the computer system so they can use firewall
software to protect their data from cyber-attacks. It provides a virtual barrier that
controls the spam mails and other unauthorized networks and it has the capability to
increase security by controlling computer networks. There are the following task
perform by firewall technology
Validate access
Defend resources
Manage and control network traffic
Act as an intermediary
Identify unwanted signals
In this modern generation, most of the consumers use internet connectivity to transfer
data or information from one location for which they use a third-party application that
HACKING THE HUMAN
11
stored their personal details. To avoid such kind of issue Robert can adopt firewall
technology and they can identify the fraud case or traffic signals.
Cryptography technology
Cryptography is a kind of technique for protecting communication system from cyber-
attacks and it is also called cryptology. This technology plays a significant role in the
reduction of data breach and other security issues because of it crypt the data or
information which is transferred from one source to another. Advanced cryptography
exists at the intersection of the disciplines of computer science, communication and
physics and many organizations use this technique to improve security in
communication. Now, this technology is completely based on mathematical theory and
computer science by which hackers are not able to understand the data or information.
Robert can involve this technique in their security plan because it is more confidential,
and avoid the unauthentic networks from computer devices.
Back up employees system regularly
It is a very common step to address the problem of ransom ware attack because many
consumers back up their personal information on Google. If any attackers hack
employee’s data then they can restore back from their backup plans and they can safe
their information. With the help of this technique, Robert can reduce wanna cry and
other cyber-crimes and cloud computing is an advanced technique that can be used as a
backup plan (Pasqualetti, Dörfler, and Bullo, 2013).
Robust technique
This is an alternative approach which is used to identify the unauthentic signals and
links. It is observed that many hackers send spam messages and mails on consumer’s
accounts that are developed by malware software. After that users click on that links
and lost their mobile or computer information and hackers enter into a computer device
and encrypt all personal details (Sahi, 2017). To avoid this type of issues Robert and
David can adopt a robust technique that detect spam mails and messages from the
computer system and block them by which the problem of ransom ware attack
(Amoroso, 2012). it has the ability to control and monitor the fraud websites and fraud
mails and users can identify the main key element that increases the issue of the data
breach.
11
stored their personal details. To avoid such kind of issue Robert can adopt firewall
technology and they can identify the fraud case or traffic signals.
Cryptography technology
Cryptography is a kind of technique for protecting communication system from cyber-
attacks and it is also called cryptology. This technology plays a significant role in the
reduction of data breach and other security issues because of it crypt the data or
information which is transferred from one source to another. Advanced cryptography
exists at the intersection of the disciplines of computer science, communication and
physics and many organizations use this technique to improve security in
communication. Now, this technology is completely based on mathematical theory and
computer science by which hackers are not able to understand the data or information.
Robert can involve this technique in their security plan because it is more confidential,
and avoid the unauthentic networks from computer devices.
Back up employees system regularly
It is a very common step to address the problem of ransom ware attack because many
consumers back up their personal information on Google. If any attackers hack
employee’s data then they can restore back from their backup plans and they can safe
their information. With the help of this technique, Robert can reduce wanna cry and
other cyber-crimes and cloud computing is an advanced technique that can be used as a
backup plan (Pasqualetti, Dörfler, and Bullo, 2013).
Robust technique
This is an alternative approach which is used to identify the unauthentic signals and
links. It is observed that many hackers send spam messages and mails on consumer’s
accounts that are developed by malware software. After that users click on that links
and lost their mobile or computer information and hackers enter into a computer device
and encrypt all personal details (Sahi, 2017). To avoid this type of issues Robert and
David can adopt a robust technique that detect spam mails and messages from the
computer system and block them by which the problem of ransom ware attack
(Amoroso, 2012). it has the ability to control and monitor the fraud websites and fraud
mails and users can identify the main key element that increases the issue of the data
breach.
HACKING THE HUMAN
12
Maintain and update software
Many hackers attack the old computer system that works on windows 7 or XP because
this system does not involve any security tool. According to given scenario employees
have old computer devices due to which the issue of a data breach can be increased for
which they can adopt modern computer networks. Update software on regular basis is
also the best way to maintain and control the ransom ware attack and employees
should ensure that they use only authentic networks (Sood, and Enbody, 2013).
It is recommended that the problem of hacking and ransom ware attack can be resolved
by adopting the security programmes and techniques like encryption and firewall.
Watson organization can develop their own computer network because many networks
are very less secure by which they can face the problem of a data breach. There are few
steps that can be used for Watson Widget which are the following:
Use encryption process during communication
Maintain and update software
Use only authentic servers
Connect Wi-Fi with secure networks
Avoid Spam mails and websites
Use backup plans
Use proper configuration during generation of network
Provide training and education to employees
Use a firewall technique for internet connectivity
Adopt antivirus software
Limited login attempts
Change password regularly
Ethical and morality issues
Ethics is a kind of field study which is concerned with distinguishing right from wrong
and it analyses the morality of human behaviours, social structures and laws. It is
observed that there are main two theories used in ethics such as consequentialism and
deontology. The consequentialist process assumes that the actions taken by the
Watson's Widgets organization are wrong to the extent that they have bad consequence
12
Maintain and update software
Many hackers attack the old computer system that works on windows 7 or XP because
this system does not involve any security tool. According to given scenario employees
have old computer devices due to which the issue of a data breach can be increased for
which they can adopt modern computer networks. Update software on regular basis is
also the best way to maintain and control the ransom ware attack and employees
should ensure that they use only authentic networks (Sood, and Enbody, 2013).
It is recommended that the problem of hacking and ransom ware attack can be resolved
by adopting the security programmes and techniques like encryption and firewall.
Watson organization can develop their own computer network because many networks
are very less secure by which they can face the problem of a data breach. There are few
steps that can be used for Watson Widget which are the following:
Use encryption process during communication
Maintain and update software
Use only authentic servers
Connect Wi-Fi with secure networks
Avoid Spam mails and websites
Use backup plans
Use proper configuration during generation of network
Provide training and education to employees
Use a firewall technique for internet connectivity
Adopt antivirus software
Limited login attempts
Change password regularly
Ethical and morality issues
Ethics is a kind of field study which is concerned with distinguishing right from wrong
and it analyses the morality of human behaviours, social structures and laws. It is
observed that there are main two theories used in ethics such as consequentialism and
deontology. The consequentialist process assumes that the actions taken by the
Watson's Widgets organization are wrong to the extent that they have bad consequence
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
HACKING THE HUMAN
13
but deontological model assumes that consumers have moral duties to secure their
private details (Yang, et al., 2009).
The major ethical issue of Watson's Widgets is that their employee was playing the
football league which creates a problem in the system and hackers collected their
personal information. Due to which Watson organization can suffer from the economic
condition and recent event shows that Robert stops their business for one day due to
wanna cry ransom ware attack because hackers demand money to restore their data.
The other morality issue is that their employee did not follow their duties and provided
their identification to another person due to which Watson's Widgets suffered from the
morality issue. The compromises of the confidentiality of data may cause extra harm
and right violations and many third party websites are developed by hackers to store
the user personal information (Zimba, Simukonda, and Chishimba, 2017).
HR staff directing meetings of candidates for cyber security employments won't have an
undeniable resume thing to search for, requiring IT division heads to supervise the
enlisting procedure and removing time from different obligations. That being stated, it
integrates with a key point in regards to this issue – pioneers of corporate cyber
security groups must form a morally solid culture from the beginning and organization
it among senior representatives, so new contracts quickly grasp positive propensities.
The ACM code of ethics involves major four steps for example, general ethical principles,
professional responsibilities, professional leadership principles, compliance with the
code. According to this code employee should be honest and secure their personal
information but in the given scenario worker played football league in their system and
he did not provide honesty towards their work which broken the code of ethics.
Conclusion
This report is completely based on the cyber security breach and with the help of this
report readers can enhance their knowledge in the field of cyber-attacks. Recent event
observed that there employees use third party application like football league which is
developed by hackers. This report explained the concept of wanna cry attack and
prevention methods to mitigate such kind of problem in the organization. There are
main three technologies by which Robert can address the issue of a data breach such as
13
but deontological model assumes that consumers have moral duties to secure their
private details (Yang, et al., 2009).
The major ethical issue of Watson's Widgets is that their employee was playing the
football league which creates a problem in the system and hackers collected their
personal information. Due to which Watson organization can suffer from the economic
condition and recent event shows that Robert stops their business for one day due to
wanna cry ransom ware attack because hackers demand money to restore their data.
The other morality issue is that their employee did not follow their duties and provided
their identification to another person due to which Watson's Widgets suffered from the
morality issue. The compromises of the confidentiality of data may cause extra harm
and right violations and many third party websites are developed by hackers to store
the user personal information (Zimba, Simukonda, and Chishimba, 2017).
HR staff directing meetings of candidates for cyber security employments won't have an
undeniable resume thing to search for, requiring IT division heads to supervise the
enlisting procedure and removing time from different obligations. That being stated, it
integrates with a key point in regards to this issue – pioneers of corporate cyber
security groups must form a morally solid culture from the beginning and organization
it among senior representatives, so new contracts quickly grasp positive propensities.
The ACM code of ethics involves major four steps for example, general ethical principles,
professional responsibilities, professional leadership principles, compliance with the
code. According to this code employee should be honest and secure their personal
information but in the given scenario worker played football league in their system and
he did not provide honesty towards their work which broken the code of ethics.
Conclusion
This report is completely based on the cyber security breach and with the help of this
report readers can enhance their knowledge in the field of cyber-attacks. Recent event
observed that there employees use third party application like football league which is
developed by hackers. This report explained the concept of wanna cry attack and
prevention methods to mitigate such kind of problem in the organization. There are
main three technologies by which Robert can address the issue of a data breach such as
HACKING THE HUMAN
14
encryption, firewall and robust technology. Employees should ensure that they use only
authorized servers and use back up plans to secure original information or documents.
14
encryption, firewall and robust technology. Employees should ensure that they use only
authorized servers and use back up plans to secure original information or documents.
HACKING THE HUMAN
15
References
Abawajy, J., (2014) User preference of cyber security awareness delivery
methods. Behaviour & Information Technology, 33(3), pp.237-248.
Amoroso, E., (2012) Cyber-attacks: protecting national infrastructure. Elsevier.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K.,
(2016) A review of cyber security risk assessment methods for SCADA
systems. Computers & security, 56(2), pp.1-27.
Clarke, R. and Youngstein, T., (2017) Cyberattack on Britain’s National Health Service—
a wake-up call for modern medicine. N Engl J Med, 377(5), pp.409-11.
Ehrenfeld, J.M., (2017) Wanna cry, cybersecurity and health information technology: A
time to act. Journal of medical systems, 41(7), p.104.
Fovino, I.N., Masera, M. and De Cian, A., (2009) Integrating cyber-attacks within fault
trees. Reliability Engineering & System Safety, 94(9), pp.1394-1402.
Gayle, D., Topping, A., Sample, I., Marsh, S. and Dodd, V., (2017) NHS seeks to recover
from global cyber-attack as security concerns resurface. The Guardian, 13(2), pp. 6-10.
Gómez-Hernández, J.A., Álvarez-González, L. and García-Teodoro, P., (2018) R-Locker:
Thwarting ransomware action through a honey file-based approach. Computers &
Security, 73(4), pp.389-398.
Gordon, W.J., Fairhall, A. and Landman, A., (2017) Threats to Information Security—
Public Health Implications. New England Journal of Medicine, 377(8), pp.707-709.
Hug, G. and Giampapa, J.A., (2012) Vulnerability assessment of AC state estimation with
respect to false data injection cyber-attacks. IEEE Transactions on Smart Grid, 3(3),
pp.1362-1370.
Jarrett, M.P., (2017) Cybersecurity—a serious patient care concern. Jama, 318(14),
pp.1319-1320.
15
References
Abawajy, J., (2014) User preference of cyber security awareness delivery
methods. Behaviour & Information Technology, 33(3), pp.237-248.
Amoroso, E., (2012) Cyber-attacks: protecting national infrastructure. Elsevier.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K.,
(2016) A review of cyber security risk assessment methods for SCADA
systems. Computers & security, 56(2), pp.1-27.
Clarke, R. and Youngstein, T., (2017) Cyberattack on Britain’s National Health Service—
a wake-up call for modern medicine. N Engl J Med, 377(5), pp.409-11.
Ehrenfeld, J.M., (2017) Wanna cry, cybersecurity and health information technology: A
time to act. Journal of medical systems, 41(7), p.104.
Fovino, I.N., Masera, M. and De Cian, A., (2009) Integrating cyber-attacks within fault
trees. Reliability Engineering & System Safety, 94(9), pp.1394-1402.
Gayle, D., Topping, A., Sample, I., Marsh, S. and Dodd, V., (2017) NHS seeks to recover
from global cyber-attack as security concerns resurface. The Guardian, 13(2), pp. 6-10.
Gómez-Hernández, J.A., Álvarez-González, L. and García-Teodoro, P., (2018) R-Locker:
Thwarting ransomware action through a honey file-based approach. Computers &
Security, 73(4), pp.389-398.
Gordon, W.J., Fairhall, A. and Landman, A., (2017) Threats to Information Security—
Public Health Implications. New England Journal of Medicine, 377(8), pp.707-709.
Hug, G. and Giampapa, J.A., (2012) Vulnerability assessment of AC state estimation with
respect to false data injection cyber-attacks. IEEE Transactions on Smart Grid, 3(3),
pp.1362-1370.
Jarrett, M.P., (2017) Cybersecurity—a serious patient care concern. Jama, 318(14),
pp.1319-1320.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
HACKING THE HUMAN
16
Kshetri, N. and Voas, J., (2017) Do Crypto-Currencies Fuel Ransomware?. IT Professional,
4(5), pp.11-15.
Mohurle, S. and Patil, M., (2017) A brief study of wanna cry threat: Ransomware attack
2017. International Journal of Advanced Research in Computer Science, 8(5), pp. 10-14.
Pascariu, C., BARBU, I.D. and Bacivarov, I.C., (2017) Investigative Analysis and Technical
Overview of Ransomware Based Attacks. Case Study: WannaCry. Intel J. Info. Sec. &
Cybercrime, 6(2), p.57.
Pasqualetti, F., Dörfler, F. and Bullo, F., (2013) Attack detection and identification in
cyber-physical systems. IEEE Transactions on Automatic Control, 58(11), pp.2715-2729.
Sahi, S.K., (2017) A Study of WannaCry Ransomware Attack. International Journal of
Engineering Research in Computer Science and Engineering, 4(9), pp.5-7.
Sood, A.K. and Enbody, R.J., (2013) Targeted cyber attacks: a superset of advanced
persistent threats. IEEE security & privacy, 11(1), pp.54-61.
Yang, S.J., Stotz, A., Holsopple, J., Sudit, M. and Kuhl, M., (2009) High-level information
fusion for tracking and projection of multistage cyber-attacks. Information Fusion, 10(1),
pp.107-121.
Zimba, A., Simukonda, L. and Chishimba, M., (2017) Demystifying Ransomware Attacks:
Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and
Information Security. Zambia ICT Journal, 1(1), pp.35-40.
16
Kshetri, N. and Voas, J., (2017) Do Crypto-Currencies Fuel Ransomware?. IT Professional,
4(5), pp.11-15.
Mohurle, S. and Patil, M., (2017) A brief study of wanna cry threat: Ransomware attack
2017. International Journal of Advanced Research in Computer Science, 8(5), pp. 10-14.
Pascariu, C., BARBU, I.D. and Bacivarov, I.C., (2017) Investigative Analysis and Technical
Overview of Ransomware Based Attacks. Case Study: WannaCry. Intel J. Info. Sec. &
Cybercrime, 6(2), p.57.
Pasqualetti, F., Dörfler, F. and Bullo, F., (2013) Attack detection and identification in
cyber-physical systems. IEEE Transactions on Automatic Control, 58(11), pp.2715-2729.
Sahi, S.K., (2017) A Study of WannaCry Ransomware Attack. International Journal of
Engineering Research in Computer Science and Engineering, 4(9), pp.5-7.
Sood, A.K. and Enbody, R.J., (2013) Targeted cyber attacks: a superset of advanced
persistent threats. IEEE security & privacy, 11(1), pp.54-61.
Yang, S.J., Stotz, A., Holsopple, J., Sudit, M. and Kuhl, M., (2009) High-level information
fusion for tracking and projection of multistage cyber-attacks. Information Fusion, 10(1),
pp.107-121.
Zimba, A., Simukonda, L. and Chishimba, M., (2017) Demystifying Ransomware Attacks:
Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and
Information Security. Zambia ICT Journal, 1(1), pp.35-40.
1 out of 17
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.