Please find the attached document to write all the 3 questions in APA format. Please follow highlighted yellow lines for instructions.
1 attachments
Slide 1 of 1
attachment_1
attachment_1
UNFORMATTED ATTACHMENT PREVIEW
Question 1: Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion. Your post should be 400 words long (40 points). Please use APA throughout. Answer: Answer all the questions. Use APA format with more than 300 words and at least 3 references Question 2 : Response by: Vanitha Boreddy A vulnerability assessment is the process of identifying the qualitative, quantifying and prioritizing the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply systems, transportation systems, and communication systems. Such assessments may be conducted on behalf of a range of different organizations, from small businesses up to large regional infrastructures. Vulnerability from the perspective of disaster management means assessing the threats from potential hazards to the population and to infrastructure. It may be conducted in the political, social, economic or environmental fields. Vulnerability assessment services: 1. network mapping 2. vulnerability scanning 3. phishing assessment 4. wireless assessment 1. Network mapping: The network mapping means that a network that should it is a graphical representation of all the computers and devices on your network that shows each it is connected. 2. Vulnerability scanning: vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures. 3. Phishing assessment: phishing attacks are emails that claim to be from a legitimate sender in order to obtain sensitive information such as usernames and passwords, credit cards and other personal information. Phishing emails also contain malicious attachments designed to infect computers and mobile devices. 4. Wireless assessment: wireless means which works through a satellite versions and it is not connected to any wires it is simply based on the connections through wireless. whether you accepting the response or against the response depending upon the question in more than 200 words. Below are additional suggestions on how to respond to your classmates’ discussions: · Ask a probing question, substantiated with additional background information, evidence or research. · Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives. · Offer and support an alternative perspective using readings from the classroom or from your own research. · Validate an idea with your own experience and additional research. · Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings. · Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence. Question 3. Response: by Rohit Khapekar In the recent world, data is called the backbone of any industry to survive. The flow of data is responsible to bind the clients and business together. This flow will ultimately results into making the end product more efficient. For instance, for any financial organization huge amount of inflow of customers information takes place like banking, insurance, medical sectors. This data is genuine and the security breach can results into damage of companies reputation and it will ultimately ends into degrading of the economy of the organization. Theses organization receives threats from the hackers regularly. So to prevent this, a highly specialize security mechanism should be built to secure the system from the unwanted malware. A special cell like cyber security is important to setup to deal with such big issues. For an instance, the company Equifax which is responsible for managing the credit card reforms of many customers, was in the loop for security breach. This breached the data of the customers. The explanation from the Equifax officers were not clear and up to the mark. Equifax had to set multiple lawsuits from the various customers that directly affected the reputation of the company. It ultimately results into freezing the account of most of the customers. The most important factors affecting the security breach is encryption of the data in improper manner. The data of the customers should be given prime importance. The malware detection system should be strong enough to detect the attack and stop the breach (Chen, H., &Dongre, R. (2014)). Answer : Please add your comments whether you accepting the response or against the response depending upon the question in more than 200 words. Below are additional suggestions on how to respond to your classmates’ discussions: · Ask a probing question, substantiated with additional background information, evidence or research. · Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives. · Offer and support an alternative perspective using readings from the classroom or from your own research. · Validate an idea with your own experience and additional research. · Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings. · Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.
Purchase answer to see full attachment