Assignment #1

docx

School

Texas A&M University *

*We aren’t endorsed by this school

Course

527

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by CommodoreField12479

Report
Cyber Attacks - why do they work? Based on the reading and other sources, discuss your thoughts, supported with research, on the key reasons why cyber-attacks succeed? Cyberattacks continue to succeed due to a combination of evolving tactics and the persistent presence of vulnerabilities in the digital landscape. These reasons are supported by extensive research and industry observations. Cyberattacks are successful because they exploit weaknesses in technology, processes, and human behavior. To improve cybersecurity, organizations and individuals must adopt proactive measures, regularly update and patch systems, and prioritize cybersecurity awareness and education. Cyberattacks succeed for several key reasons, which can be summarized as follows: - Cybercriminals often target vulnerabilities in software, hardware, or human behavior. These vulnerabilities can include unpatched software, weak passwords, misconfigured systems, or unknown zero-day vulnerabilities. Attackers exploit these weaknesses to gain unauthorized access. - Human Error: People are often the weakest link in cybersecurity. Human errors, such as clicking on malicious links, falling for phishing scams, or unintentionally exposing sensitive information, can provide attackers with entry points. - Inadequate Security Measures: Organizations may not implement or maintain robust cybersecurity measures, leaving their systems and data vulnerable. This can include insufficient firewall configurations, lack of intrusion detection systems, or inadequate employee training. - Outdated Software and Patch Management: Failure to update and patch software and systems regularly can leave them exposed to known vulnerabilities that attackers can exploit. Attackers often target systems that have not received security updates. - Weak Authentication and Access Controls: Weak or default passwords, inadequate authentication processes, and improper access controls can make it easier for attackers to gain unauthorized access to systems and sensitive data. - Lack of Security Awareness: Insufficient cybersecurity awareness among employees and individuals can lead to risky behaviors and a lack of vigilance against potential threats. To mitigate the success of cyberattacks, individuals and organizations must adopt a proactive and multi- layered approach to cybersecurity. This includes regularly updating software, implementing strong access controls, educating employees and users about cybersecurity best practices, and staying informed about emerging threats and vulnerabilities. Additionally, robust incident response plans are essential for minimizing the impact of successful cyberattacks when they do occur. Works Cited Donalds, Scott E., and Siegel, Stanley G. , and Williams, Chris K., and Aslam, Abdul. Enterprise Cybersecurity . 2015.
Huang, Kemon, and Wang, Xiaoqing, and Wei, William, and Manic, Stuart. The Devastating Business Impacts of a Cyber Breach . Harvard Business Review. May 4, 2023. https://hbr.org/2023/05/the-devastating-business-impacts-of-a-cyber-breach
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help