Prevention of Cyber Attacks - PDF

Added on - Jun 2021

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 4 of 11 pages
Student Name:Student ID:Cyber SecurityStudent NameInstitution1
Student Name:Student ID:Table of ContentsINTRODUCTION...........................................................................................................................................2DISADVANTAGES OF HACKBACK................................................................................................................3Cyber attackers should be identified......................................................................................................3The law should be obeyed......................................................................................................................3Encourages the hackers..........................................................................................................................4Does not solve the problem...................................................................................................................4Collateral damage...................................................................................................................................4Nonstate Actors......................................................................................................................................4Attacker Uses Victim Country.................................................................................................................5PREVENTION OF CYBER ATTACKS...............................................................................................................5Preforming a risk assessment.................................................................................................................5Undertaking training on cybersecurity...................................................................................................5Staying up to date with threats..............................................................................................................5Mitigating Targeted Intrusions...............................................................................................................6Honey Pot/Honey Net............................................................................................................................6Active Defense Tools...............................................................................................................................6Denial and Deception.............................................................................................................................6ACTIONS TAKEN INCASE OF AN ATTACK....................................................................................................6Notify the incidence team......................................................................................................................7Notify the relevant authorities and law enforcement...........................................................................7Do an analysis to know the extent of the damage.................................................................................7IT systems should be secured.................................................................................................................7Implement your backup plan..................................................................................................................7RECOMMENDATIONS.................................................................................................................................8CONCLUSION...............................................................................................................................................8INTRODUCTION2
Student Name:Student ID:Cyber-attacks have become increasingly high as technology continues to grow. There is a need toeffectively combat cybercrimes in the world over. Various technologies and software have come up intackling the issues related to cyber-attacks. The processes and technologies designed to protect systems,networks and data are what make up cyber security. The attacks are aimed to cause harm by changingor destroying data. Therefore, cybersecurity is important because it helps not only organizations andcompanies but also individual people from the harm that may be caused by a cyber-attack. Some of thethreats associated with cybersecurity include: ransomware, malware, social engineering, phishingamong others. Some of the technologies designed to effectively deal with cyber attacks includeIn recent years, IT professionals in companies and organizations want laws to be made to allow themretaliate against cyber attacks rather than wait for the appropriate authorities to take action. They arguethat it would minimize the number of times the company is attacked. (Hutchinson, 2013).In my report, I argue that retaliation is not the best solution in combating cyber attacks. The “hack back”notion should be avoided. “The best defense is a strong offence”, this is a term used by most people butthat’s not the reality when it comes to cyber attacks. In fact, the only defense in cyberspace is a strongdefense. My report shows that there are better ways in combating cyber attacks rather than retaliation.It advocates for better defensive strategies to handle cyber attacksDISADVANTAGES OF HACKBACKThe following is a discussion on why retaliation or hack back is a wring response to fighting cyberattacks.Cyber attackers should be identifiedBy the use of retaliation or hack back, it nearly impossible to find the real culprit behind the attack.Great hackers usually mask their attacks and it becomes difficult to identify and to tell who it is and themain reason behind the attack. Therefore, the attacker will not be brought to justice and they may endup coming back to attack again. Therefore, in case of an attack the organization should let theappropriate authorities investigate and find the culprits behind the hacks. It is of great importance tobring the attackers to justice so that they may not repeat the same again.The law should be obeyedBy use of retaliation, the company or organization may find themselves breaking the law so as to getback at the attacker. Most hackers don’t value the law and so by doing that they break most laws whenattacking a company. For an organization to hack the hacker they may also need to go around some lawsso as to harm the attacker. This is morally and unlawful because it is not accepted to intentionally harm3
Student Name:Student ID:others in a cyber-attack. In the US the Computer Fraud and Abuse Act of 1986 (CFAA) has beeninterpreted broadly enough that unauthorized access to almost any computer is seen as illegal(Sullivan,2016).Encourages the hackersWhen some hackers notice that you want to hack them back, they get encouraged and determined tocontinue executing the hack. Some may even start using dangerous and harmful techniques. Also, acompany or an organization may not realize that the attackers may have more resources than them andthis may cause the company to fight a loosing battle. The attack could be more severe than the firstattack before the counter attack.Does not solve the problemHacking back does not solve the problem. It doesn’t assure you that the threats to you company ororganization have ended. After identifying the vulnerability in your systems or network, it is importantto ensure that you handle the vulnerability to ensure that no one else hacks into the system.Collateral damageCyber wars may lead to unintended harm to the company’s asset. It may lead also to the damage of athird party. This may cause the third party to seek legal assistance which may be damaging to thecompany(Maybury, 2018). Also, as the cyber wars or retaliation happens unintentional spread of themalware to the internet may occur. The effects felt may be unintentional but that’s what happens whena cyber weapon is used. The malware interacts with the already vulnerable Information system and theeffects caused cannot be underestimated or overlooked.Nonstate Actors.Countries with limited or minimal government and legal restrictions are a good place for cyber attackers,terrorist groups and hacktivists to operate in. Example, when some Russian hacktivists decided to issue aDOS attack on the country of Estonia in 2007, Estonia requested for support and assistance fromMoscow to track the attackers but Moscow refused to assist them hence their requests were denied.This is because the hacktivists had support from kremlin. (Jensen, 2012).Had Estonia decided to retaliate against the hacktivist group, it risked the possibility of escalating thecrisis further between the two nations. Another instance of a scenario like this involves a third-partycountry which is no allies or friend to the country that has been attacked. If the victim country retaliatesagainst the third-party state it would be intruding on the sovereignty of the third country. Retaliation onthe third-party state even if it’s a success, it would not have achieved anything or made an effect4
Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access