Assignment #1
docx
keyboard_arrow_up
School
Texas A&M University *
*We aren’t endorsed by this school
Course
527
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by CommodoreField12479
Cyber Attacks - why do they work?
Based on the reading and other sources, discuss your thoughts, supported with research, on the key
reasons why cyber-attacks succeed?
Cyberattacks continue to succeed due to a combination of evolving tactics and the persistent presence of
vulnerabilities in the digital landscape. These reasons are supported by extensive research and industry
observations. Cyberattacks are successful because they exploit weaknesses in technology, processes, and
human behavior. To improve cybersecurity, organizations and individuals must adopt proactive
measures, regularly update and patch systems, and prioritize cybersecurity awareness and education.
Cyberattacks succeed for several key reasons, which can be summarized as follows:
- Cybercriminals often target vulnerabilities in software, hardware, or human behavior. These
vulnerabilities can include unpatched software, weak passwords, misconfigured systems, or unknown
zero-day vulnerabilities. Attackers exploit these weaknesses to gain unauthorized access.
- Human Error: People are often the weakest link in cybersecurity. Human errors, such as clicking on
malicious links, falling for phishing scams, or unintentionally exposing sensitive information, can provide
attackers with entry points.
- Inadequate Security Measures: Organizations may not implement or maintain robust cybersecurity
measures, leaving their systems and data vulnerable. This can include insufficient firewall configurations,
lack of intrusion detection systems, or inadequate employee training.
- Outdated Software and Patch Management: Failure to update and patch software and systems regularly
can leave them exposed to known vulnerabilities that attackers can exploit. Attackers often target
systems that have not received security updates.
- Weak Authentication and Access Controls: Weak or default passwords, inadequate authentication
processes, and improper access controls can make it easier for attackers to gain unauthorized access to
systems and sensitive data.
- Lack of Security Awareness: Insufficient cybersecurity awareness among employees and individuals can
lead to risky behaviors and a lack of vigilance against potential threats.
To mitigate the success of cyberattacks, individuals and organizations must adopt a proactive and multi-
layered approach to cybersecurity. This includes regularly updating software, implementing strong access
controls, educating employees and users about cybersecurity best practices, and staying informed about
emerging threats and vulnerabilities. Additionally, robust incident response plans are essential for
minimizing the impact of successful cyberattacks when they do occur.
Works Cited
Donalds, Scott E., and Siegel, Stanley G. , and Williams, Chris K., and Aslam, Abdul.
Enterprise
Cybersecurity
.
2015.
Huang, Kemon, and Wang, Xiaoqing, and Wei, William, and Manic, Stuart.
The Devastating
Business Impacts of a Cyber Breach
. Harvard Business Review. May 4,
2023.
https://hbr.org/2023/05/the-devastating-business-impacts-of-a-cyber-breach
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help