Discussion and Response Cyberattacks

Find and view several online videos on recent cyberattacks (less than 2 years ago). Identify the URLs for 2 videos that you think do a particularly good job of illustrating (1) the worst case scenario and (2) the best case scenario when it comes to cybersecurity. Briefly describe each situation and what the worst case scenario could learn from the best case scenario?

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

ASSIGNMENTS IN FULL APA FORMATTING WITH IN-TEXT CITATIONS.

You must provide your own response to the main question, plus reply to two (2) other students’ responses to the question, for a total of three (3) postings for each Discussion Question assignment. All discussion questions must include a minimum of one reference but should include all those used in the development of your response to the discussion question.

Initial post: 250 words

Reply to two classmates’ posts (post 1 and post 2): 150 words each

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Find and view several online videos on recent cyberattacks (less than 2 years ago). Identify the URLs for 2 videos that you think do a particularly good job of illustrating (1) the worst case scenario and (2) the best case scenario when it comes to cybersecurity. Briefly describe each situation and what the worst case scenario could learn from the best case scenario?

ASSIGNMENTS IN FULL APA FORMATTING WITH IN-TEXT CITATIONS.

You must provide your own response to the main question, plus reply to two (2) other students’ responses to the question, for a total of three (3) postings for each Discussion Question assignment. All discussion questions must include a minimum of one reference but should include all those used in the development of your response to the discussion question.

Initial post: 250 words

Reply to two classmates’ posts (post 1 and post 2): 150 words each

by Manoj Kurubur Venkateshappa

Typically, cybercriminals see cybercrime as a defined attack and they use one or more computers to hack multiprocessor networks. It disables mobile computers and steals their data by injecting malware and viruses into the client device. 

The worst example is Wannacree; it was a ransomware attack in May 2017. It spreads quickly and spreads a virus that infects all the files on the computer. It encrypts all the data stored on the client device and appears as “WannaCry”. It decrypts the entire hard drive and requires a certain amount of bitcoins to be paid. Here Bitcoins are currency and they have excellent privacy. If a customer sends money in the form of Bitcoin to another customer, then the details are not displayed. Their names and other information are changed and it looks like some other garbage. 9380 and they need -30 20-30 to decrypt all of our data. This virus has affected Microsoft’s operating systems affiliated with Windows XP and Windows 7. Microsoft has already informed all of its contents Customers need to update their operating system to Windows 8 and their latest releases They advised that Microsoft was not responsible for any virus attacks on operating systems. (Sapienza, A., Ernala, S. K. (2018).

A good example of this is GitHub, and it’s a massive rejection of a service attack. It handles 2 TB of heavy traffic per second while visiting some popular sites. They place their defense 4 times higher than their backs. So a third party is trying to steal their data; it captures them and their IP address and netmask are blocked. Before the attack, he suffered again. So this experience helped them to avoid future attacks. Their servers are required to receive encrypted data at a glance. They use some well-known malware and firewalls to get rid of unauthorized sites and information coming into their servers. (Rauf, U. (2018).

References

Sapienza, A., Ernala, S. K., Bessi, A., Lerman, K., & Ferrara, E. (2018). Discover: Mining online chatter for emerging cyber threats. In Companion Proceedings of the The Web Conference 2018 (pp. 983-990).

Rauf, U. (2018). A Taxonomy of Bio-Inspired Cyber Security Approaches: Existing Techniques and Future Directions. Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 43(12), 6693–6708. 

https://doi.org/10.1007/s13369-018-3117-2

by Prabin Bhandari

Cyber Attack

Introduction:

Directly installed, a cyber-crime is an initiative originated of a person about more extra machines toward the different network, various machines, about materials. Cyber-charges vessels are divided feathers within a couple of broad classes charges wherever the single purpose means to incapacitate that purpose processor either beat it offline about crimes wherever one purpose means to gain entrance into this victim network data also possibly obtain admin prerogatives about it. To accomplish these purposes of getting entrance or damaging developments, a quantity of various scientific techniques do deploy with cybercriminals. There remain forever different programs generating, including any concerning those sections overlay, though those do some times that yourself several possible to understand considered. Malware, Phishing, Ransomware, Denial of Service, Man into this centre, Crypto-jacking, SQL medicine, Zero-day achievements. Just because a community works mainly about technology, we do more because one event depends upon it. And perfectly as technology delivers always-greater bonuses, it additionally declares ever-greater warnings: at this powerful energy from these possibilities, it manifests it displays a focal feature concerning cybercrime, technical surveillance, including cyberattacks. Consequently, preserving that comprises of eminent advantage. That director studies are unusual about specific interests backing us during sole near expectation that incorporates, Seizure vectors so being botnets, independent vehicles, including ransomware. Warnings including information administration, know crime, including cyberwarfare. Extraneous investments before-mentioned being information freedom, digital tracks, including leveraging technology notable Additionally, this produces an unusual environment so unique species from digital ecosystems including significant fundamentals about cybersecurity. Critically, that certificate simplifies the unique consequence as Australia undergoing accountability to its personal cybersecurity, principally among concerns so necessary foundation including governance. Approaching this flip faction furthermore while unitedness concerning specific fastest-flourishing entrepreneurs globally explaining our personal cybersecurity energy means including an opening concerning commercial fullness, assignment universe, including knowledge warranting Australia happens adequately.(Clive James, 2016)

References:

Aparavi. (2020, July 27). How to prevent ransomware attacks and protect your organization. APARAVI. https://www.aparavi.com/how-to-prevent-ransomware-attacks/ 

Seals, T. (2019, August 8). State farm falls victim to credential-stuffing attack. Threatpost | The first stop for security news. https://threatpost.com/state-farm-credential-stuffing-attack/147139/

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP