Strayer University How to Prevent Cyber Attacks Ransomware Response Paper

User Generated

funlgubznf

Writing

Strayer University

Description

View the video Ransomware Response from Chief Kilbane (transcript [DOCX] here). Then create a checklist to help the chief with the ransomware attack in his city. In the checklist, you need to create items to address the following issues:

  1. List and briefly describe the technological items to help your city prepare to withstand ransomware attacks.
  2. List and briefly describe the personnel items to help your city prepare to withstand ransomware attacks.
  3. List and briefly explain the training requirements to help your city prepare to withstand ransomware attacks.
  4. List and briefly describe the items you will do to mitigate the damage that already took place.
  5. Use at least three quality references for this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: PREVENTING CYBER-ATTACKS

How to Prevent Cyber-Attacks
Student’s Name
Institutional Affiliation

1

PREVENTING CYBER-ATTACKS

2

How to Prevent Cyber-Attacks
Ransomware Response
With advancements in technology, hackers have targeted social networking platforms as
avenues of carrying out cyber-attacks on other people's systems. For instance, recently, Mr.
Michael Killbane, a Professor in the criminal justice department at Strayer and the Chief of
Police for the city of independence of Ohio, has admitted that the city has been undergoing
challenges. According to his revelation, the city of Ohio's data system was struck with a
ransomware attack whose traces lead to the Korean ransomware, which is quite popular (Bain,
2020). Therefore I have decided to devise a checklist that will enable Ohio to overcome these
cyber-attacks.
Technological Items Too Help in Ransomware Attacks:
Residents in the city of Ohio should be aware that the cyber attackers use the regular
profile information to develop targeted social engineering networks, faking names of their
friends to execute attacks, and using news feeds to spread SPAMS and launch massive attacks.
Therefore they have to embrace these advanced internet security options; that is, improvising
anti-viruses based on signatures. They should also avoid the risk of their systems being infected
by anti-viruses by keeping a distance from the deviant peers.
Social networks have been subjected to significant threats as the hackers use abbreviated
URLs to hide dangerous links increasing the chances of infections into...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags