ISSC361 Christchurch Mosque Shootings Report Paper

User Generated

QnqqlFunex

Writing

Description

Please write an analysis report about the most recent attack on the US Office of Personnel Management. In the report, please answer the following questions:


1- What type of attack was launched on OPM?
2- What was compromised or breached?
2- How was the attack accomplished if known?
4- Your own analysis and feedback about the attack?

5- Who are the victims? What are the implications for them?

If You used OPM as your case study in week 1, choose another attack! (My week 1 assignment is attached)

Submission Instructions:


The report must be at least 2 pages not including the cover and reference pages and must follow the APA style. You must include at least 3 references.

Unformatted Attachment Preview

Running Head: CYBER-ATTACK CASE STUDY 1 Cyber Attack Daryl Snipes Jr ISSC 361 Information Assurance March 10, 2019 2 CYBER-ATTACK CASE STUDY Introduction CYBER-ATTACK CASE STUDY 3 Cyber-attack involves any attack to expose or gain illegal approach to or make unlawful use of an aid. It is a type of abusive manner which marks computers info systems, computers grids or intimate computer appliances. The person involved in the attack attempts to access data without the authorization, potentially with malicious intent. When the attacker hacks the sensitive system, he or she has an aim to destroy or steal a specified target. The process of cyber attacking ranges from inaugurating spyware on an intimate computer to attempting to dismantle the framework of whole nations. The ace who is legally involved is always probing to cap the use of the term of episodes inducing substantial bruise and establishing it from the more conventional data breached and expansive hacking enterprises. They are also cyber warful who uses their techniques to defend and attack info and computer structures that populate computer network. The process goes through the dull cyber drive and a related array of disks. The cyber-attack is contributed by factors such as the spectacular factor which measures the actual damage achieved by an attack. Whenever there is an attack, it creates many losses and gathers negative publicity. Another factor is the vulnerability factor which involves exploiting the vulnerable companies or any state establishment, (Dasgupta, D., & Wu, Q., 2014, June). The state can be obliterated on a web page, and a company can be liable to a rebuttal of service incursion. The cyber-attack reduces the integrity and the credibility of data which happens through nasty code which emends program sanity and curbs the data thus causing errors in the output. Every year, the cybercrimes have increased as people have tried to benefit from vulnerable business systems. The cyber-attacks are always launched through ulterior motives as other loose to annihilate schemes and data as a mode of hacktivism. There are several types of cyber-attacks such as the malware which is described as viruses or ransomware, (Arlitsch, K., & Edelman, A., 2014). The attack ruptures a network through amenability whenever the user bangs a critical link which later installs risky software. The malware software does the following when it gets into the system: 1. It blocks access to critical components of the network. 2. It adds more adverse software. 3. It surreptitiously gets info by convey data from the hard drive. Another type of cyber-attacks is the phishing which comprises the sending of deceitful communications which appear to come from an important source. The phishing attack steals sensitive data such as the login information. Another cyber-attack is zero-day exploit which involves hitting after a network vulnerability is announced. The attackers target the described weakness during the window time. There was a cyber-attack which happened to the Adobe Company. The Adobe announced that they had a massive hacking of its IT infrastructures. The software engineers of the company confirmed that the usernames and encrypted passwords were stolen for about 50 million users. The attackers also pervaded details from an undefined number of accounts that had been unused for more than two years. More so, some source code was stolen for the Photoshop which is their picture editing program. CYBER-ATTACK CASE STUDY 4 The antecedent code for its Acrobat PDF document filing software and cold fusion web application items has been immensely accessed. The attackers stole the program so that they can analyses how Adobe software works and copy its technique. The attack made the Adobe Company to shift its devices to an acceptance model whereby their consumers required to roster an account and give their fee card minutiae to entitle for upgrades. However, the adobe spokesperson guarded the matter that it is antecedent affidavit did not affirm the full scale of the incident. The company validates the information they could be able to communicate. The management admitted that the encrypted acclaim and debit cards numbers, item cessation dates had been an arbiter in the case of the authentic 2.9 million users diagnosed. The passwords were afterward rejected as a caution across the encryption being hacked. But resetting the passwords would not help to protect their customers from that of having their accounts on other benefits being hacked whenever they use similar usernames and passwords. The Adobe commodities are equipped on many end users’ computers and used on many joint and state attendants around the globe companies’ fear. The leak on encryption data and any other insurance designs and the software amenability can be used to bypass safeguard for individuals and amalgamated data. The encryption can create a chance for a new bearing of viruses and escapades. Adobe Company value the trust of their consumers and thus they work oppressively to counter any other type of attack from happening in the future. Adobe regretted the in concinnities which were caused by the cyber-attack. The cyber-attack made adobe to face criticism of how they secure their data. All the identical customers’ passwords arose exactly when encrypted which made it simple for the hackers to detect devices and guess passwords accurately. The company contacted the banks to work on the fee card organizations and card-issuing banks to help customers account. The company offered the customers whose debit card information was affected to enroll in one-year appreciatively credit auditing enrollment where convenient. There is a global shortage of cybersecurity skill which makes many organizations more desirable targets for hacking. Since many companies have realized their current IS strategy is not sufficient, there will be high demand for expertise. Companies have been in surging their security requirements, internal training and skills growth has to continue to expedite. The AIpowered attacks of the next generation will be astute enough to mimic the behaviors of specific users to fool unskilled security personnel. The capacity to art intricate and bespoke phishing campaigns will strongly fool the most menace cognizant among us, (Hathaway, & Nix, H., 2012). The cyber attackers will continue becoming more organized and more commercialized whereby they might even have their call centers. The cyber attackers will look for the base such as a country where cybercrime is barely regarded as a crime; thus they place themselves away from their victim’s police arbitrations. To maintain participation in the digital society, there should be trust as essential for growth. Companies should build systems which are reliable and secure which will make them earn trust. The company should provide credible and comprehensive information so that they help people to fathom and assess how confident they are. The research and contraption generate advances which help cybersecurity keep up with the evolving cyber risks. The advances create a trusted and buoyant digital environment. Research organizations should be developed to help 5 CYBER-ATTACK CASE STUDY support the process in cyber security and also the research should be perused such that it blends acumens from different disciplines and around the world. References Hathaway, O. A., Crootof, R., Levitz, P., & Nix, H. (2012). The law of cyber-attack. Calif. L. Rev., 100, 817. Simmons, C., Ellis, C., Shiva, S., Dasgupta, D., & Wu, Q. (2014, June). AVOIDIT: A cyberattack taxonomy. In 9th Annual Symposium on Information Assurance (ASIA’14) (pp. 212). Arlitsch, K., & Edelman, A. (2014). Staying safe: Cyber security for people and organizations. Journal of Library Administration, 54(1), 46-56.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: ISSC361 CURRENT AFFAIRS REPORT

ISSC361 Current Affairs Report
Institutional Affiliation
Date

1

ISSC361 CURRENT AFFAIRS REPORT

2

a) Type of Attack Launched
The gunfire attacks of the Christchurch mosques based in New Zealand were two
subversive physical assaults that happened in sequence, and the attacker was an Australian man.
Al Noor Mosque was the first to be invaded, and approximately three hundred to five hundred
Muslims are believed to have been inside the mosque for their usual Friday prayer when the
shooting began. The attacker took a few minutes in the mosque where he shot at the attendants
aimlessly or wildly (Coombes, 2019). The terrorist also went towards injured innocent citizens
shooting at them countless times then left the mosque and started shooting at those innocent
American civilians outside then got to his vehicle, fetched a different armament and headed back
inside the mosque to kill additional victims. Majority of the victims were severely injured
making it difficult for them to run away. Afterward, he got into his vehicle and hurriedly drove
towards the direction of the Linwood Islamic Centre, and that was around fifteen minutes later.
Approximately 49 Muslim believers were killed making it the current and the most severe
aggression in a streak of intrusions aimed at Muslims across the western community. More than
46,000 citizens of New Zealand are Muslims and the terrorist attacker mainly targeted on the
aliens.
b) The ...

Related Tags