Erika PCS Assignment

doc

School

University of the Cumberlands *

*We aren’t endorsed by this school

Course

22327

Subject

Information Systems

Date

Nov 24, 2024

Type

doc

Pages

4

Uploaded by Teja1202

Report
1 The brief introductions to some of these vulnerabilities were enlightening regarding the security risks. One particular vulnerability that stood out was the "man-in-the-middle" attack, which involves an attacker intercepting communication between two parties and potentially altering or stealing sensitive information. This attack is particularly concerning because it can be difficult to detect, as both parties may believe they are communicating directly. The introduction also highlighted how easy it can be for attackers to carry out this attack using readily available tools and techniques. Another vulnerability introduced was software vulnerabilities, which contain flaws or weaknesses that attackers can exploit. With so much business conducted online and through various software applications, such vulnerabilities pose a significant risk to individuals and organizations (Yazdanmehr & Wang, 2023). For instance, a SQL injection attack could allow an attacker to gain unauthorized access to sensitive information by exploiting weaknesses in a website or application's code. Similarly, XSS exploits exploit web applications that fail to secure user input fields properly or filter out malicious scripts. Phishing scams pose another threat: unsuspecting users may unwittingly provide their login credentials or financial information through fraudulent emails with fake links. Ransomware attacks restrict system access until the victim pays a sum of money demanded by the hacker/attacker. Such attacks have become increasingly prevalent due to their high pay-offs for attackers and unpreparedness for victims, who often do not back up important files beforehand (Yazdanmehr & Wang, 2023). In today's digital age, cybersecurity has become one of the most critical issues for businesses and individuals. With cyber threats becoming more sophisticated every day, it is essential to understand the complexities and weaknesses in cybersecurity that leave systems vulnerable to attacks. Many risks associated with cybersecurity are well-known and widely
2 understood by those in the industry. However, despite this knowledge, these risks continue to be exploited regularly. One such weakness is human error. No matter how secure a system may be on paper – if users fail to practice safe online habits or do not follow security protocols – all security efforts can quickly become futile. Another complexity lies within outdated technology or software systems with vulnerabilities that hackers can easily exploit. Businesses and organizations must invest properly in their IT infrastructure by keeping hardware updated with current patch releases from manufacturers as soon as possible; failing this, they risk losing protected data due to open doors inside their networks. After carefully reviewing their course curriculum, the social psychology topic stood out to them as it was particularly enlightening and important. Social psychology is a fascinating field of study that explores how people behave, think, and feel in a social environment (Yazdanmehr & Wang, 2023). One valuable concept they learned was group polarization. In this phenomenon, individuals within a discussion or group tend to adopt extreme views similar to their beliefs over time. This happens because confirmation bias plagues many individuals when they exclusively engage with like-minded people with similar attitudes. Group polarization has crucial implications for real-life discussions and politics worldwide, such as on issues related to climate change or economic policy. Once groups become polarized, solutions may take time to come across. Therefore, understanding how this phenomenon works can help them better appreciate different approaches when interacting with others about opposing viewpoints. Reporting breaches is an essential aspect of ensuring data security in any organization. A breach refers to unauthorized access, disclosure, or destruction of protected information such as personally identifiable information (PII), financial records, and health information, among
3 others. The repercussions of a breach can be damaging for both the affected individuals as well as the organization responsible for their safety. The importance of reporting breaches is that it allows for prompt identification and management of risks associated with compromised data. If organizations fail to report these incidents promptly, they risk further exposure or damage caused by sensitive data leaks into criminal hands. When reporting a breach incident, several crucial pieces must be included within the submitted reports to ensure proper handling and successful mitigation strategies are implemented effectively. Moreover, identifying who experienced vulnerabilities alongside where these weaknesses arose from will enable analysts implementing comprehensive countermeasures best suited towards defending against similar attacks whilst preventing future ones altogether - solidifying organizational resilience & reducing threat vectors long term. When reporting a breach, several pieces of information are crucial for authorities or IT departments to effectively respond. The first piece of information necessary is identifying what type of data has been breached – including confidential documents, login credentials, financial records, or personally identifiable information (PII). This helps those responsible for taking action prioritize resources toward securing key assets. Another vital component required when reporting a breach includes understanding how the incident occurred. This could be through employee error, such as weak passwords on shared accounts or phishing scams where an attacker impersonates someone known by an individual within their organization via email or other communication methods (Shaikh & Siponen, 2023).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 References Shaikh, F. A., & Siponen, M. (2023). Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers & Security, 124, 102974. Yazdanmehr, A., & Wang, J. (2023). Can peers help reduce violations of information security policies? The role of peer monitoring. European Journal of Information Systems, 32(3), 508-528.