Pick 3 Indiana companies, explore their website, and determine: Threat/Vulnerability/Threat Action What Vulnerability mitigation techniques can be used for your companies?

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Pick 3 Indiana companies, explore their website, and determine:
Threat/Vulnerability/Threat Action
What Vulnerability mitigation techniques can be used for your companies?

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Follow-up Questions
Read through expert solutions to related follow-up questions below.
Follow-up Question
  1. Eli Lilly and Company

    • Threat: Phishing attacks are a significant threat to pharmaceutical companies like Eli Lilly. Cybercriminals may attempt to impersonate the company to steal sensitive research or personal information.

    • Vulnerability: Employees may inadvertently fall victim to phishing emails, clicking on malicious links or downloading harmful attachments.

    • Threat Action: Cybercriminals send convincing-looking emails that appear to be from trusted sources, tricking employees into revealing sensitive information.

    • Vulnerability Mitigation Techniques:

      • Employee Training: Regular training and awareness programs can educate employees about the dangers of phishing and how to recognize phishing attempts.
      • Email Filtering: Implement advanced email filtering systems to identify and quarantine phishing emails before they reach employee inboxes.
      • Multi-Factor Authentication (MFA): Require MFA for accessing sensitive systems and data to prevent unauthorized access.
  2. Cummins Inc.

    • Threat: Industrial espionage and cyber-attacks are a concern for manufacturing companies like Cummins. Competitors or nation-states may attempt to steal intellectual property or disrupt operations.

    • Vulnerability: Vulnerable endpoints or unpatched systems within Cummins' network could be exploited to gain unauthorized access.

    • Threat Action: Attackers may employ malware or social engineering tactics to compromise endpoints and gain access to sensitive data.

    • Vulnerability Mitigation Techniques:

      • Regular Patch Management: Ensure all software and systems are up-to-date with the latest security patches.
      • Network Segmentation: Isolate critical systems from less critical ones to limit lateral movement for attackers.
      • Intrusion Detection Systems (IDS): Deploy IDS to detect and respond to suspicious activities within the network.
  3. Anthem, Inc.

    • Threat: Healthcare companies like Anthem are prime targets for data breaches due to the wealth of sensitive patient data they hold.

    • Vulnerability: Weaknesses in Anthem's data storage and access control systems could lead to unauthorized data access.

    • Threat Action: Attackers may attempt to infiltrate the network to steal medical records or commit identity theft.

    • Vulnerability Mitigation Techniques:

      • Data Encryption: Encrypt sensitive data both in transit and at rest to protect it from unauthorized access.
      • Access Control: Implement strict access controls and role-based permissions to limit who can access sensitive data.
      • Regular Security Audits: Conduct regular security audits and penetration testing to identify and address vulnerabilities proactively.

Could you please provide websites links for three websites? thank you

Solution
Bartleby Expert
SEE SOLUTION
Knowledge Booster
Primary components of process planning
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education