Cyber Attack Case Study

Superior Essays
1a. Strategic planning to prevent and/or fight off cyber attacks

Preventing Cyber Attack-Identifying Top Risks

Strategic planning begins with the prevention or minimizing the attack to a business. Businesses are a value and because a business has value, there will always be a threat for business information, and this is what makes a business vulnerable.
Businesses need to be aware of what risks are available and how that information can be protected. Once the critical business information is identified, a planned response needs to be identified as to how to protect that information. The protection plan may begin with the Information Technology (IT) Department with software but essentially it is individual responsibility of how the information is kept safe. Information is always vulnerable and people are looking to find ways to gain access.
By having checks in place, if a hack does occur, the violation can be detected sooner and planning continues to prevent future attacks from happening again by devising a deflect plan, and how to go about defending in the future.
Firewalls are put in place to keep individuals from hacking into the database at the place of my employment. There are times when hacking still occurs. What is learned from the hacking, how the situation is handled, and new
…show more content…
I was involved in the Target cyber-attack. I was aware of the Target compromise but a few weeks had passed and everything appeared to be normal. It was three weeks after the compromise and, while I was not contacted by Target, I was notified by my bank that suspicious activity had taken place on my bank account. My bank reissued a new debit card with a new identification number and took care of the activity on my account. While I do not know what the activity was or the amount, I know my bank was paying attention to my accounts and continues that service today. That in itself gives me peace of

Related Documents

  • Great Essays

    Internal Security Threats

    • 1296 Words
    • 6 Pages

    What this means is that the company is taking every precaution to have the right people on the job when it comes to security as well as the most up-to-date security systems available. A breach may happen, but knowing that your company has done everything to protect against an attack should allow some peace of mind. Two ways that resource allocation translates into the workplace are: 1. Adding further encryption to already secure sites. 2.…

    • 1296 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Key Term Business Risk

    • 716 Words
    • 3 Pages

    Key Term and Why are You Interested in it I choose the key term business risk because I am interested in the causes of business failures and possible ways to prevent it. Business risk influences are the negative impacts of sales, costs, competition, or economic conditions. Supply and demand factors could also result in the failure of a business. The three types of business risk are ownership risk, operation risk, and transfer risk (Satterlee, 2014). In an effort to protect and prevent business failure, business professionals must be aware and prepared for the threat of anything that could cause damage to the company’s profits or reputation.…

    • 716 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Malicious code designed to exploit such vulnerabilities are a threat to confidential information Consequently, it is essential that small businesses keep their software and applications up-to-date with the latest patches. Updates to everything from Microsoft Office applications to new operating systems should be routinely checked for and downloaded. These patches and updates can be found on the specific vendor's website and their installation is particularly critical after a new product is released. Educate…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Computer security should be the focus for every organization. Organizations can combat cyber terrorism by implementing a recovery process (Easttom, 2012). This recovery process will let an organization that undergoes a security issue recover data, and also recover the entire network if needed. If a security incident occurs because an employee or an outside attacker deletes key information, an organization can quickly recover those files (Easttom, 2012). Further, an organization needs to assess the information they have and decide which information is sensitive, or critical to business operations (Easttom, 2012).…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Reconnaissance involves gathering information of a target without any prior knowledge about the company relating to or an individual. It includes both Passive and Active Reconnaissance. This steps helps to discover useful data which can assist them to plan the attack. Scanning is the phase which takes place exactly after the attacker is able to collect enough information to understand the business works and those data which are valuable. Hackers uses this collecteddata to find a way which will help them executing an attack on the Operating System, Installed Software, Open Ports, IP Addresses or user accounts.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    To protect my company assets from cyber threats/attacks many things must be taken into consideration because there is always a deeper internal issue in what we believe is secure. Risk assessment and risk management are both very important parts of planning to create a safe, secure work environment to protect my employees and company both on the inside and outside of the company. I would assure that my company conducts a risk assessment periodically. This helps to see what has failed in the past versus what improvements and corrective actions have been made to present day. Comparing and contrasting the effects of failures also helps to determine if the current improvement fall into the same category.…

    • 700 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Without it, how else will an organization know what their weaknesses are and what they can do to improve their defenses? As mentioned previously, Deerman (2012) found that there are three main phases of the malware lifecycle. Through the good intentions of implementing white hat hacking, an organization will be able to clearly see the vulnerabilities in their system and where attackers will most likely hit first. Understanding the offensive and defensive perspectives of the malware lifecycle will equip the organization with the adequate skills and tools to disable the first phase from developing so the malware never reaches the second or third phases. The best method of security is to always take preventative…

    • 1603 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    One of the greatest ways to prevent invaders from getting into your computer is to apply patches and other software fixes when they become available. By regularly updating your computer, you block outsiders from being able to take advantage of software flaws that they could otherwise use to break into your system. You should also…

    • 2603 Words
    • 11 Pages
    Great Essays
  • Improved Essays

    Developing an effective network infrastructure by using resource hardware components as switches and routers to boost network security can reduces business operations interruption from attacks. Intrusion detection systems (IDS) can screen the system to identify and eliminate security breaches. By installing necessary system security gadgets and programming as firewalls are fundamental valuable for shielding inward frameworks from outer dangers over the Internet (Cisco Healthcare Security Perspectives,…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The foregoing means that the software prevents hackers and crackers from accessing password prompts from the company. Such a condition means that it will be difficult for them to access any leads that might result to corruption of data. In addition, the PureVPN protects the firewall that protects the company’s network from malicious access and programs. Notably, rival companies might hire hackers to direct malicious programs to the Advanced Research Company’s network in order to corrupt the data held there within (Pure VPN Review, n.d). However, with the presence of this software, malicious programs will be detected and eliminated before doing any harm to the data.…

    • 1226 Words
    • 5 Pages
    Great Essays