Assignment#2
docx
keyboard_arrow_up
School
American Public University *
*We aren’t endorsed by this school
Course
452
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
3
Uploaded by PresidentRiverWasp4
Engelken_Assignment 2
Let me begin by defining a cyberattack. A cyberattack is an intentional and malicious effort by an organization or individual to breach the systems of another organization or individual (Cassetto, 2023). The motive? There are many reasons, but to name a few, theft, financial gain, or sabotage. Our world is greatly invested in a digital form and cyber threats are growing at a rapid pace; it is nearly impossible for an organization to prepare for them all.
Technology is evolving every day, and new gadgets are being released daily. Due to the rapid
innovations and lack of security, each unsecured connection means vulnerability (Georgetown University).
Threats to information security include, but are not limited to, malware, phishing, and ransomware. I would like to further explain these examples. Malware would include adware that is would be designed to produce ads to a user’s computer that are unwanted. Phishing typically arises in the form of emails. Phishing is used to steal a user’s data; which can include their login information and/or credit card information. Cybercriminals send a fake email to a user’s email address with a fictitious link and when the user clicks on the link and inserts their information, the cybercriminal can steal their data. Ransomware typically happens to high-profile companies. There are several types of ransomware, but to name one, lockers. Lockers will completely lock a user out of their system and their files become inaccessible (Baker, 2023). The user’s computer will display a screen with a ransom note and
a demand, until the ransom is fulfilled, the computer’s data will remain inaccessible to the correct user.
The company must invest 100% in protection for their information security. Information security protects sensitive information from unauthorized activities and the goal is to ensure safety and privacy.
Reference
Baker, Kurt. (2023). 5 Types of Ransomeware
. Crowdstrike. Web.
Cassetto, Orion. (2023). Cybersecurity Threats: Everything You Need To Know
. Exabeam. Web.
Top 10 Threats to Information Security.
(2023). Georgetown University. Web.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help