Module 1 Discussion Question
Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion within the past 5 years?What information was targeted? Was the attack successful? If so, what changeswere made to ensure that this vulnerability was controlled? If not, what mechanisms were in place to protect against the intrusion?
You must write about a real-life network/system attack that you found through your internet research. Failure to discuss a targeted attack and cite/reference the news source will result in a 0 for this entire discussion.
I am adding my classmate’s response for the above question. You will have to write response for each post in 150 words. No references needed.
Technological growth and the internet age has brought with it increased cases of cybercrimes where cybercriminals target personal information of governments, private firms, and even individual consumers. The value of data and its sensitivity to persons who own it have made cybercrimes and system intrusions very costly for the victims.
In 2017, Equifax broke the news of the system intrusion it had suffered as a company and the resultant exposure of data for approximately 143 million citizens of the United States. The other citizens who had been affected were UK citizens and Canadians, whose specific numbers were not revealed. The breach was noted to have affected online web application only with core consumer database untouched. The information targeted the names, dates of birth, residential addresses, social security numbers, and driver’s license numbers of the consumers.
The company responded to the breach by setting up a website from which customers would be able to tell if they were affected and the potential impact that it may have if their data was accessed (Nurse, 2017). Other measures included the company asking customers to register with their TrustedID premiere, which is a service used in credit monitoring from which they had to agree to a compulsory arbitration clause that would not apply to claims that may have originated from the security breach.
In the wake of the attack, and in a bid to forestall such attacks in the future, Equifax employed a new chief information security officer and rolled out comprehensive efforts to change their approach to data security. Equifax also invested more than $200 million on infrastructures that would help in securing user data, and the chief information security officer since reiterated that the company had allocated him enough resources to ensure they build hack-proof security systems. The company in the process prioritized fundamentals, and essential projects first given the need for an overhaul of most systems like vulnerability management and patching processes.
A network intrusion system from being hijacked and used, the computer equipment must have the ability to be disconnected from the network. The type of computer equipment used is very important. The most common computers used in intrusion systems are laptops which run Windows operating system. In this case, the network intrusion system would monitor the laptops which are connected to the network but it would not be able to determine any identity of the computers that are being used in the network. When a computer is not present in the network and a computer is not in the network, the intrusion system does not interfere with the operation of the network. (Alhadad, R. 2019).
For a network intrusion system to be successful, there must be an entry in the intrusion database called network intrusion. This entry has to contain detailed information like IP address, MAC address, hostname, ports that are used, and all the traffic traffic that is flowing through that entry. This is an attack scenario when the attack has a purpose, and has an objective, and has a target. In an attack situation, this is a threat scenario. In an intrusion scenario the attack is carried out by a hacker using malware, or a Trojan, on a computer. The computer has become compromised. Once the computer has become compromised, the hacker enters the network and creates the network intrusion rules on the compromised computer. The computer can now be used as a target for an attack. DANE This is an intrusion system that intercepts the data traffic on the network. It looks the computers, then sends the information in the email. This is the system that can be used for monitoring the computers that are being monitored. If the intrusion system detects any login attempts from unauthorized computers, it is supposed to shut down the unauthorized users. This way, the intruder will not be able to break into your network and compromise your personal data. Network intrusion systems are very useful in preventing and containing network intrusions. These intrusion systems are installed on computers that are connected to the local network and to the internet via a firewall or router. (Poornachandran, P. 2018).
We aim at 100% customer satisfaction. As such, we never compromise on the quality of our assignment services and strive to maintain the highest standards of work for all our clients. Our writers craft each paper carefully to match the requirements on the instructions form while at the same time being surgical and objective while handling client work.
We receive many applications from writers around the world daily. Nevertheless, we only choose the cream of the crop to tackle your “help with homework” requests. Hence, our homework helpers are highly-qualified individuals who adhere to our quality policy.
We maintain a fair pricing policy for all our homework help services. Our pricing system generates quotations based on the requirements of each paper. Hence regardless of the complexity or duration of a paper, our system determines the most accurate and pocket-friendly price for all our clients.
At MyHomeworkWriters, we guarantee all students swift delivery of their assignments. We understand that time is an essential factor in the academic world. We, therefore, ensure that all assignments are delivered on or before the agreed deadline. This leaves room for editing to incase the client wants changes done to the work delivered by our writers.
We maintain a zero-plagiarism policy in all our papers. Our writers stick to the instructions to deliver plagiarism-free work. Other than that, they extensively research the work they are handling and are keen to avoid any chance of similarities with previously written papers. Our editors check every completed work to ascertain it’s at the set standards.
Our main objective is to assist you through every step of your academic journey. Thus, we completely understand that you might run into trouble once in a while when interacting with our system. If you do run into trouble, please get in touch with our support agents and they will immediately provide you with assistance. Feel free to contact us via the Chat window or email us.
Follow these simple steps to get your homework done
Fill in the order form and provide all details of your assignment.
Choose the payment system that suits you most.
You will be able to track the progress of your paper from our system.
Once your paper is ready, we will email it to you.
Myhomeworkwriters holds a reputation for providing high-quality assignment writing services. You only need to give us all the requirements for your “do my homework” order, and our writers will give you the best results.
Our team is skilled and equipped in searching for information required to complete work handed over to them. Regardless of the complexity of the work, we are determined to get the job done. Extensive research when handling client requests makes it possible for us to be able to stick to the boundaries and guidelines set by the clients. Thus enabling us to keep the work original and plagiarism free.
We have highly qualified writers to assist you whenever you place in "help with my homework" order. Our essay writing service is designed to not only help students get good grades but also excel in their studies. Our writers are highly experienced and educated specialists and professionals who want to do more than creating a difference in the academic field.
Our editors have a keen eye when going through work. They can capture even the smallest of errors. This has been made possible by the fact that we have been in the academic field for more than 5 years now. Thus, they bring with them previous experience when going through work to be able to capture everything. These unique skills make it possible for us to deliver error-free work to our clients.
Our team has very experienced specialists and professionals. This gives us a competitive edge over our competitors. Whenever we receive work that needs to be redone, everyone gets involved. That’s inclusive of our editors. This collective involvement in doing work makes it possible for us to deliver high-quality work to all our clients. Other than that it makes it possible for us to adhere to our originality and plagiarism-free policies.