Ask Computer Network & Security Expert

To improve cyber security, think like a hacker

The problem

It is examined that many different issues have been noticed over the web. One of the main issues that can be seen is the cyber security issues. There are different attacks on the business all over, and the valuable information and the capital are stolen and that hurts the company at all stages. Here both hackers and the mindsets are discovered over the time. In this case, the details about the cyber attacks have been analyzed. The hacker mindset is to conquer and looks for the opportunity all the time. The main thing that has been analyzed in this case is that the scanning is done, identifies the opportunity, gain the access and then they maintain that access so that no one could enter into the system. Here negativity is there in the mindset of the hackers, and that is needed to be stopped any cost so that the prevention could be done.

Opportunity/solution

As there are a couple of issues that prevails they are needed to be addressed, and the solution is needed to be provided. In this case, I will like to recommend a couple of solutions to the management so that the security lapse could be fulfilled. Here the IT system needs to be triple layered so that the security issues could be reduced at the minimum time. On the other hand the loopholes that are present in needs to be taken care so that best practices could be determined overall. Here it is important to make sure the security is tightened only specific persons should be allowed in the system and the authorization needs to be tight too. Therefore all apects are needed to be taken in control by the management.

second one is

The Vulnerability Economy- Zero Days.
The problem began in fall 2010 when an unknown malware attacked the Iranian unclear program. Stuxnet attacked Iranian uranium enrichment facilities in Natanz. It was a zero-day virus which is new and difficult to detect. I think, this kind of organizations should have very strong anti-virus and firewalls. Unlike the normal programs, unclear programs could be targeted due to their importance.

Billon Beresford worked on this problem to discover its root. He purchased S7s from Siemens but Stuxnet also attacked Siemens. After 2 months, he found that the vulnerabilities impacted multiple lines of Siemens.S7. He could sell the vulnerabilities, but he did not. Someone in Beresford's position does not necessarily have to give away his discovery. Another possibility hangs in the air: He could sell the vulnerabilities. For Beresford, selling his wares might be more difficult than it appears. The market for Zero-Days is not transparent: much of the buying and selling happens in information settings and underground.

In my onion, Beresford better to sell his discovery because there are another guys looking for what Beresford is looking for and they may discover vulnerabilities. Also, what is Siemens releases a new upgrade or update for its products and avoids the vulnerabilities.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92341955
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As