Erika PCS Assignment
doc
keyboard_arrow_up
School
University of the Cumberlands *
*We aren’t endorsed by this school
Course
22327
Subject
Information Systems
Date
Nov 24, 2024
Type
doc
Pages
4
Uploaded by Teja1202
1
The brief introductions to some of these vulnerabilities were enlightening regarding the
security risks. One particular vulnerability that stood out was the "man-in-the-middle" attack,
which involves an attacker intercepting communication between two parties and potentially
altering or stealing sensitive information. This attack is particularly concerning because it can be
difficult to detect, as both parties may believe they are communicating directly. The introduction
also highlighted how easy it can be for attackers to carry out this attack using readily available
tools and techniques. Another vulnerability introduced was software vulnerabilities, which
contain flaws or weaknesses that attackers can exploit. With so much business conducted online
and through various software applications, such vulnerabilities pose a significant risk to
individuals and organizations (Yazdanmehr & Wang, 2023).
For instance, a SQL injection attack could allow an attacker to gain unauthorized access
to sensitive information by exploiting weaknesses in a website or application's code. Similarly,
XSS exploits exploit web applications that fail to secure user input fields properly or filter out
malicious scripts. Phishing scams pose another threat: unsuspecting users may unwittingly
provide their login credentials or financial information through fraudulent emails with fake links.
Ransomware attacks restrict system access until the victim pays a sum of money demanded by
the hacker/attacker. Such attacks have become increasingly prevalent due to their high pay-offs
for attackers and unpreparedness for victims, who often do not back up important files
beforehand (Yazdanmehr & Wang, 2023).
In today's digital age, cybersecurity has become one of the most critical issues for
businesses and individuals. With cyber threats becoming more sophisticated every day, it is
essential to understand the complexities and weaknesses in cybersecurity that leave systems
vulnerable to attacks. Many risks associated with cybersecurity are well-known and widely
2
understood by those in the industry. However, despite this knowledge, these risks continue to be
exploited regularly. One such weakness is human error. No matter how secure a system may be
on paper – if users fail to practice safe online habits or do not follow security protocols – all
security efforts can quickly become futile. Another complexity lies within outdated technology or
software systems with vulnerabilities that hackers can easily exploit. Businesses and
organizations must invest properly in their IT infrastructure by keeping hardware updated with
current patch releases from manufacturers as soon as possible; failing this, they risk losing
protected data due to open doors inside their networks. After carefully reviewing their course
curriculum, the social psychology topic stood out to them as it was particularly enlightening and
important. Social psychology is a fascinating field of study that explores how people behave,
think, and feel in a social environment (Yazdanmehr & Wang, 2023).
One valuable concept they learned was group polarization. In this phenomenon,
individuals within a discussion or group tend to adopt extreme views similar to their beliefs over
time. This happens because confirmation bias plagues many individuals when they exclusively
engage with like-minded people with similar attitudes.
Group polarization has crucial implications for real-life discussions and politics
worldwide, such as on issues related to climate change or economic policy. Once groups become
polarized, solutions may take time to come across. Therefore, understanding how this
phenomenon works can help them better appreciate different approaches when interacting with
others about opposing viewpoints.
Reporting breaches is an essential aspect of ensuring data security in any organization. A
breach refers to unauthorized access, disclosure, or destruction of protected information such as
personally identifiable information (PII), financial records, and health information, among
3
others. The repercussions of a breach can be damaging for both the affected individuals as well
as the organization responsible for their safety.
The importance of reporting breaches is that it allows for prompt identification and
management of risks associated with compromised data. If organizations fail to report these
incidents promptly, they risk further exposure or damage caused by sensitive data leaks into
criminal hands.
When reporting a breach incident, several crucial pieces must be included within the
submitted reports to ensure proper handling and successful mitigation strategies are implemented
effectively. Moreover, identifying who experienced vulnerabilities alongside where these
weaknesses arose from will enable analysts implementing comprehensive countermeasures best
suited towards defending against similar attacks whilst preventing future ones altogether -
solidifying organizational resilience & reducing threat vectors long term.
When reporting a breach, several pieces of information are crucial for authorities or IT
departments to effectively respond. The first piece of information necessary is identifying what
type of data has been breached – including confidential documents, login credentials, financial
records, or personally identifiable information (PII). This helps those responsible for taking
action prioritize resources toward securing key assets. Another vital component required when
reporting a breach includes understanding how the incident occurred. This could be through
employee error, such as weak passwords on shared accounts or phishing scams where an attacker
impersonates someone known by an individual within their organization via email or other
communication methods (Shaikh & Siponen, 2023).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
References
Shaikh, F. A., & Siponen, M. (2023). Information security risk assessments following
cybersecurity breaches: The mediating role of top management attention to
cybersecurity. Computers & Security, 124, 102974.
Yazdanmehr, A., & Wang, J. (2023). Can peers help reduce violations of information security
policies? The role of peer monitoring. European Journal of Information Systems, 32(3),
508-528.