About the wannacry ransomware attack

Assignment Help Other Subject
Reference no: EM132350368

1. Fruhlinger (2018) posted about the Wannacry ransomware attack of May 2017. This was, in the opinion of many experts, a warning attack. If the hackers had not left a 'kill-switch' within the code of the ransomware the attack could have been worse and impossible to stop. The Windows application that this attack took advantage of was the SMB protocol which allows communication between computers in a network. The vulnerability in the SMB protocol had been discovered by the NSA who had, instead of reporting it, used it to create the EternalBlue exploit. This exploit was released to the public and has been used since for many different types of attacks (Schirmarcher, Ondrus & Tan, 2018).

This was a security misconfiguration vulnerability in the OWASP top ten. This is because the SMB protocol could have been secured if only network admins around the world had bothered to install the patch that had already been released by Microsoft. The availability and confidentiality components of the CIA triad were affected by this ransomware attack.

After the attack there has been a lot of talk as to the future of cybersecurity and how easy it is for exploits such as these to spread globally. Once more it seems that the industry is far behind the attackers when it comes to anticipating exploits. This is especially made worse by the fact that there is negligence by corporations e.g. some corporations still use Windows XP.

Answer:

I want 250 words explanation on above paragraph with 3 reference, your sentence must be start from, I would like to add some more details on your discussion....

2. Application vulnerabilities are increasing in today's world by different kinds of attacks such are phishing, crypto-jacking, Service attacks etc. This kind of vulnerabilities can occur in different places like user personal computers, client machines or within the end-user workstations. In order to avoid these kinds of vulnerabilities companies must take precautions in discovering and preventing the attacks.

There are several kinds of vulnerabilities are occurred in the Microsoft. Such is, an elevation privilege vulnerability have occurred .net framework which could give access to an unauthorized person or an intruder at an elevated level. With this elevated privilege vulnerability, an entire organization would be in danger as this could give access to whole data or files in the organization. The Broken access control, insecure deserialization will be applicable to this kind of vulnerability. All there CIA components will come into the picture. The insecure deserialization can be detected through the application security tools where a broken access control needs to do testing through the testing tools and also penetration testing will be helpful in identifying the non-functional access controls.

There was a problem associated with Microsoft excel which is an information disclosure vulnerability. Authentication is not required to exploit this vulnerability and coming to the CIA triad it is impacting the confidentiality component. We can protect this kind of vulnerability through testing before launching into the real world.

Answer:

I want 250 words explanation on above paragraph with 3 reference, your sentence must be start from, I would like to add some more details on your discussion....

Reference no: EM132350368

Questions Cloud

What is the place of deuteronomy within the story of bible : What is the place of Deuteronomy within the story of the Bible? What purpose did it serve to the ancient Israelites? What purpose does it serve today?
Financial information is used in health care organizations : Analyze the ways financial information is used in health care organizations. Define and discuss consolidated financial statements and how these are used.
Human resources at local health care organization : Arrange an interview with head of human resources at a local health care organization. Define how well their practices follow model and how effective they are
Describes roles-responsibilities of health care management : Describes the roles and responsibilities of health care management in addressing this pressing dilemma. What are the major financial issues being faced?
About the wannacry ransomware attack : Fruhlinger (2018) posted about the Wannacry ransomware attack of May 2017. This was, in the opinion of many experts, a warning attack.
Identify journal article related to obesity : Identify a journal article related to obesity. What are the major differences between the cohort study design and the case-control study design?
Workflow between external systems and facilities : Create 3 workflow diagrams that explain the workflow of each process that will occur in your facility. Include workflow between external systems and facilities.
Cyber criminal threats envisaged in the project : Which of the cybercriminal threats envisaged in the Project 2020 narratives do you believe will actually pose the largest threat to society in the future?
Discuss the permissible use of violence : Discuss the permissible use of violence for any one of the following moral issues you choose: abortion, euthanasia, animal experimentation, legal punishment,

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd