Cash-back offer from April 23rd to 27th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 75.00

Ybersecurity Breach Case Studies, 6 Pages

Question posted by
Online Tutor Profile
request

cyber-attack on Saudi Aramco, the security breach on the Qatar National Bank, and the attack on the Bangladesh National Bank

==================

---- Task 3 --- 

(3) - Cybersecurity Breach Case Studies 

Throughout this course you have learned about incidences of security breaches and potential mitigation strategies. For your final Critical Thinking assignment: 

  • Submit a list of three cybersecurity breach case studies. If possible, include at least one breach that occurred in, or impacted, the Middle East. 

For each breach, write a brief statement covering the following points: 

  1. When did the incident take place (dates)? 

  1. What went wrong? 

  1. What was the outcome? 

  1. How could the breach have been prevented? 

  1. What organizational measures should be instituted? 

  • In addition to the case studies, write a short summary (2 pages) of key learning points in management of cybersecurity within enterprises. 

Directions: 

  • Your well-written paper should be 6 pages in length, not including the title or reference pages. 

  • Cite and integrate at least three credible sources, not including the textbook, to support your paper. 

  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate. 

  • You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide 

Available Answer
$ 75.00

[Solved] ybersecurity Breach Case Studies, 6 Pages

  • This solution is not purchased yet.
  • Submitted On 18 May, 2022 09:56:20
Answer posted by
Online Tutor Profile
solution
Cybersecurity Breach Case Studies Name Institution Page Break Cybersecurity Breach Case Studies Introduction Cybersecurity breaches have become rampant in the modern world, with the malicious users targeting huge corporations and government websites in a bid to execute their ill intentions. Ideal examples of such breaches that have been witnessed in the Middle East include the cyber-attack on Saudi Aramco, the security breach on the Qatar National Bank, and the attack on the Bangladesh National Bank (IQPC, 2015). Cases To present further elaboration for the different cyber breach case studies in the Middle East, it is worth noting that the cyber-attack on the state-owned Saudi Aramco. The incident took place on 15th August 2015, when hackers gained access to the company's systems, leading to the infection of over 30,000 workstations and crippling the organization's operations. The installation of sufficient security measures could have prevented the breach, and the organization ought to implement such to prevent similar events in the future.It is imperative to note that the organization is the largest global oil company with the highest value. As such, in August 2015, the company’s computer network was hit with harmful computer virus known as Shamoon; whose effects would eventually be termed as the most devastating computer security breach on a company in history. On the morning of August 15, 2012, when the company's employees were off-duty attending the Laitat al Qadr, the attackers infiltrated the company's computer network system, infecting over 30,000 workstations with the virus Shamoon (Perlroth, 2012). It is imperative to note that the attack resulted in the massive erasure of the company’s data from the computers’ hard disks, an act which crippled the business’ operations for approximately two weeks during which they worked on a recovery program. Research has established that the virus was specifically designed to execute two activities, including the replacement of the company’s data on the computer hard drives with an image of a burning American flag and issue feedback on the identities of the infected computers (Perlroth, 2012). It has also been speculated that the launch of the attack on the company’s computer infrastructure could have been facilitated by an insider who had full access to the company’s computer system. As such, it is imperative to note that the virus could have been carried in a USB stick and inserted into a PC. However, the access by the hackers was gained when one of the company’s technicians clicked on a link that would eventually open the gateway for the hackers to access the company’s computer systems (Pagliery, 2015). Despite the business maintaining its oil production at 9.5 million barrels daily, the rest of the business operations were crippled. Such operations as supply and management were all operated manually over the period of the attack (Pagliery, 2015). Like in the case of preventing other cybersecurity breaches, the attack on the Saudi Aramco company could have been successfully prevented by the installation of various security mechanisms that would prevent the launch and success of the virus. First and foremost, the installation of advanced sniffers and network traffic analysis tools such as the HTTP sniffer would significantly help in the prevention of the menace. Such tools could detect and block the virus before executing its activities in the network. Moreover, the installation of advanced and updated firewalls and antivirus/ antispyware tools would also be useful for the prevention of the attack by detecting and blocking the virus before the launch of the adversary. It is also imperative to note that, the suspicion of an insider in the activity as well as the clicking on a bad link by a technician are critical points to formulate preventive measures for the incident. First, to prevent insider assistance for such activities, the company should encrypt all its PC ports to prevent the use of USB sticks other than those meant for business purposes. Also, they could have installed reliable antivirus applications to block the content of the stick (Bendovschi, 2015). Also, the use of antispyware in the company could always warn the company’s workers of harmful links before clicking on them. The organizatio...
Buy now to view the complete solution
Other Similar Questions
User Profile
Acade...

cybersecurity paper

Businesses involved in mergers and acquisitions must exercise due diligence in ensuring that the technology environment of the future organization is robust and adequately protects their information assets and intellectual pr...
User Profile
termp...

IT104_Unit_6_Assignment.docx (2) IT-104 IT104 intro to cybersecurity Unit 6 Assignment

IT104_Unit_6_Assignment.docx (2) IT-104 IT104 intro to cybersecurity Unit 6 Assignment Abstract Perimeter controls simply detect the thre...
User Profile
termp...

IT104_Unit_4___Assignment.docx IT 104 IT 104 intro to cybersecurity: Risk and Security

IT104_Unit_4___Assignment.docx IT 104 IT 104 intro to cybersecurity: Risk and Security Assessment PURDUE GLOBAL Table of Contents IT104 UNIT 4 ASSIGNMENT....................................................................
User Profile
termp...

Cybersecurity Threats and Challenges List.docx CMGT/433 Cybersecurity Threats and Chal

Cybersecurity Threats and Challenges List.docx CMGT/433 Cybersecurity Threats and Challenges List University of Phoenix CMGT/433 Cybersecurity Threats and Challenges List Threat/Challenge Possible Impact 1. Denial ...
User Profile
termp...

Cybersecurity_Laws__.docx CYB-220 The Ageing of Cyber Laws: A Look Into Cybersecurity

Cybersecurity_Laws__.docx CYB-220 The Ageing of Cyber Laws: A Look Into Cybersecurity Laws College of Humanities and Social Sciences, Grand Canyon University CYB-220 Abstract In this paper, the main focus is how the ...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35