.

Monday, May 25, 2020

Cyber Security Article Summary - 923 Words

1.A brief summary of the range, contents, and argument of the article. Despite substantial investments, there are still major security weakness in today’s information systems. Cyber attacks have become more ubiquitous and make the affected organizations lose millions or dozens of millions of dollars. It is obvious that the security of the IT systems is stagnating and possibly degrading. Hence, the author summarizes four anti-patterns that, based on empirical evidence, are particularly common and detrimental to a strong security posture. Also, the article gives suggestion for organizations to overcome those anti-patterns. The four anti-patterns are shown below. First of all, decision†¦show more content†¦Moreover, organizations use knowledge rather than intelligence. This means that organizations rely too much on the relatively static and generic knowledge within products (e.g. virus scanners, vuln erability scanners, intrusion detection systems, application firewall, and so on). The knowledge-based approach is too static and we need to complement it with more adaptable approach based on cyber intelligence. As a result, to overcome this anti-pattern, organizations must decide what cyber intelligence to collect and how to use it. Besides, we also have to know the latest generation of attacks, Advanced Persistent Threat (APTs). APTs target people to trick them into opening malware-infected email attachments or to visit Web pages that exploit browser or plug-in vulnerabilities. For these vulnerabilities, the author demonstrates some strategies and tools against attackers. They are threat awareness, preparedness, and situational awareness. Organizations should follow these cyber intelligence to continuously analyze the strategies and tools that cyber adversaries use; minimize your attack surface; and build situation awareness of the evolving state of attacks and intrusions.Show MoreRelatedUnderstanding The Reading Strategy Of Cause And Effect1308 Words   |  6 Pagesin this article. This strategy made reading how the connection of cyber security and the U.S government files. By separating the two a clearer and concise plan was brought to light. Synthesizing. The strategies that came into play while reading this article where the constant use of the resources used by the author. The author used various sources from other publications and authors. The main resources used by the author were collected from the U.S Department of Homeland Security and variousRead MoreTop Three Trends in your profession and associated industry Annotated Bibliography1499 Words   |  6 PagesThe top three trends in the Cyber Security field are salary, career advancement, and the need for predictions of the future in how information is exchanged. Cyber-crimes are becoming more popular and because of the many attacks that are happening much more frequently it has caused for a higher demand in cyber security professionals. Companies spend millions of dollars to correct security breaches within their organization. Back in 2008 the salary range for IT security professionals were in the $80Read MoreWhy Should International Law Deal With The Uncertainties Arising From The Rise Of Irregular Forms Of Warfare?1476 Words   |  6 Pagestransnationally. Because cybersecurity is the newest and most unique national security issue of the twenty-first century, one highly recommended approach – which forms the bases of many popular policies – is to require states to adopt a universal cyber warfare doctrine. Yet, subject matter experts disagree on the effectiveness of this approach by mendicating the Tallinn Manual on the International Law Applicable to Cyber Warfare. In my research, I will explore the claims made by proponents of scholarsRead MoreThe Threat Of Cyber Security1452 Words   |  6 PagesExecutive Summary â€Å"When the Target data breach occurred in 2013, the response was surprising as it took too much time to manage the consumer fallout. Watching communications unfold over time, I assumed that lawyers must have managed the response, because marketers would have handled it differently--focusing effort on mitigating consumer trust damage, brand damage, and negative financial consequences.† Introduction Purpose The purpose of this briefing is to: †¢ Clarify the importance of cyber security inRead MoreQualitative Study1500 Words   |  6 Pagesqualitative and the purpose of the researcher is to observe and documents the behavior accurately without imposing any predetermined outcome during the naturalistic observation (Cozby Bates, 2014). No matter how hard you may work to try and stop cyber-crime, fraud cannot be eradicated, but fraud and corruption risks can be managed like any other risks. Fraud represents intentional actions of the part of the client or its personnel to the client’s financial statements, assets or both. Fraud is anRead MoreThe, Cyberwarfare, And International Law973 Words   |  4 Pagestransnationally. Because cybersecurity is the newest and most unique national security issue of the twenty-first century, one highly recommended approach – which forms the bases of many popular policies – is to require states to adopt a universal cyber warfare doctrine. Yet, subject matter experts disagree on the effectiveness of this approach by mendicating the Tallinn Manual on the International Law Applicable to Cyber Warfare. In my research, I will explore the claims made by proponents of scholarsRead MoreQuestions On The On Cyber Offense1581 Words   |  7 Pagesremains a riddle among many policymakers in the US and the world at large. â€Å"Lifting the Veil on Cyber Offense† is an article based on the National Research Council, 2009. The article raises attention-grabbing issues on the offensive usage of the cyberattack capabilities on an adversary. These include ethical, operational, legal, policy, organizational, and technical aspects of cyberattacks. The article talks about some of the comprehensive recommendations as well as the findings from the reportRead MoreCyber-Terrorism Essay981 Words   |  4 PagesCyber-Terrorism Cyber-Terrorism is a reality in the modern age of rapid technological advancement. As fast as new technology is established, people find ways to hack and corrupt it. Many times there is malicious intent behind such actions. These acts can include everything from computer viruses to contraband network servers to pirated IP addresses and credit account fraud. All of the stories we hear and those annoying emails that warn of a multitude of viruses can lull us into complacencyRead MoreThe State Of Cyber Security1389 Words   |  6 PagesThe state of Cyber Security in 2016 is a grim one, every day on the news we hear about another bank or online service getting hacked and consumer information being sold on the darknet, an â€Å"invisible† part of the internet where hackers and criminals sell personal information among other items, or a presidential candidates emails being released. Being a part of the IT community, I am more aware of all these occurrences than the average per son who just uses the internet for checking email and seeingRead MoreCyber-Attacks : Case Report889 Words   |  4 Pagesmanufactured by a third party failed to deliver adequate security, after we recommended and installed it for our clients? We will discuss these issues, but first a company is only as solid as its foundation, so in what way would cyber-attacks perhaps affect our business? The hefty price tag for cyber-crimes to any business has been rapidly climbing during the last couple of years in the United States. Not only is the cost mounting for cyber-crimes, but the quantity of these attacks has also multiplied

No comments:

Post a Comment