Improve cyber security

Assignment Help Computer Network Security
Reference no: EM131533230

To improve cyber security, think like a hacker

The problem

It is examined that many different issues have been noticed over the web. One of the main issues that can be seen is the cyber security issues. There are different attacks on the business all over, and the valuable information and the capital are stolen and that hurts the company at all stages. Here both hackers and the mindsets are discovered over the time. In this case, the details about the cyber attacks have been analyzed. The hacker mindset is to conquer and looks for the opportunity all the time. The main thing that has been analyzed in this case is that the scanning is done, identifies the opportunity, gain the access and then they maintain that access so that no one could enter into the system. Here negativity is there in the mindset of the hackers, and that is needed to be stopped any cost so that the prevention could be done.

Opportunity/solution

As there are a couple of issues that prevails they are needed to be addressed, and the solution is needed to be provided. In this case, I will like to recommend a couple of solutions to the management so that the security lapse could be fulfilled. Here the IT system needs to be triple layered so that the security issues could be reduced at the minimum time. On the other hand the loopholes that are present in needs to be taken care so that best practices could be determined overall. Here it is important to make sure the security is tightened only specific persons should be allowed in the system and the authorization needs to be tight too. Therefore all apects are needed to be taken in control by the management.

second one is

The Vulnerability Economy- Zero Days.
The problem began in fall 2010 when an unknown malware attacked the Iranian unclear program. Stuxnet attacked Iranian uranium enrichment facilities in Natanz. It was a zero-day virus which is new and difficult to detect. I think, this kind of organizations should have very strong anti-virus and firewalls. Unlike the normal programs, unclear programs could be targeted due to their importance.

Billon Beresford worked on this problem to discover its root. He purchased S7s from Siemens but Stuxnet also attacked Siemens. After 2 months, he found that the vulnerabilities impacted multiple lines of Siemens.S7. He could sell the vulnerabilities, but he did not. Someone in Beresford's position does not necessarily have to give away his discovery. Another possibility hangs in the air: He could sell the vulnerabilities. For Beresford, selling his wares might be more difficult than it appears. The market for Zero-Days is not transparent: much of the buying and selling happens in information settings and underground.

In my onion, Beresford better to sell his discovery because there are another guys looking for what Beresford is looking for and they may discover vulnerabilities. Also, what is Siemens releases a new upgrade or update for its products and avoids the vulnerabilities.

Reference no: EM131533230

Questions Cloud

View the 1980s public service announcement : View the 1980s public service announcement "This is Your Brain on Drugs". Explain why you feel this advertising campaign was or was not effective.
Why are incidental costs igored in inventory costing : Use LCM applied separately to the following individual items to compute ending inventory
Public-private partnership : Using your own words, define and describe the terms in at least 2-3 sentences
Describe features or basic advantages technology will have : Describe the features, capabilities, or basic advantages this technology will have over its predecessor. Predict the first form of technology to be phased.
Improve cyber security : what is Siemens releases a new upgrade or update for its products and avoids the vulnerabilities.
Present value of an annuity : If Pistol and Polly end up living for 15 years on their $750,000, how much could they spend each year?
Compute ending inventory using the fifo periodic system : A company reports the following beginning inventory and purchases, and it ends the period with 30 units in inventory.
Future value of monthly investments : Polly Pete is contributing $100 per month from her paycheck into her retirement account at work. She is earning 6% on the investment.
What is explanatory and response variable : a) What is explanatory and response variable? b) Is this an experimental study or an experiment? Explain why?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd