Cyber Attack Counter Measures | Homework Help Online

Our professional writers will address all you homework
requirements and provide a quality paper with guarantees of 100% plagiarism free.
We provide 24/7 customer Support.

Order Research Paper In a Few Clicks



    Get my paper done

    By clicking “Get my paper done”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related emails.

    Cyber Attack Counter Measures | Homework Help Online

    Cyber Attack Counter Measures In the world of sophisticated technology and internet security, cyber-attacks have proven to be a sensitive topic. It has been seen that various businesses and governments around the globe are working to ensure that they do not fall victim to cyberattack. Additionally, the field of cybersecurity has over the years, and today hit a critical juncture. There have been various ways that have been used to defend important information and organizations fro cybercriminals. This is important to ensure an upright organizational security posture. Cyber attacks has led to an increase loss in organization records and other important aspects which may lead to organizations lossing a lot of money. Therefore, some countermeasures are to be implemented to prevent cyber attacks in future. For example, employees

    Cyber Attack Counter Measures
    In the world of sophisticated technology and internet security, cyber-attacks have proven to be a sensitive topic. It has been seen that various businesses and governments around the globe are working to ensure that they do not fall victim to cyberattack. Additionally, the field of cybersecurity has over the years, and today hit a critical juncture.
    There have been various ways that have been used to defend important information and organizations fro cybercriminals. This is important to ensure an upright organizational security posture. Cyber attacks has led to an increase loss in organization records and other important aspects which may lead to organizations lossing a lot of money. Therefore, some countermeasures are to be implemented to prevent cyber attacks in future.
    For example, employees in various organizations in the country must be aware of the attacks that may occur and what they should do about them. The employees should be able to learn critical attack targets and operating procedures (Adams & Makramalla, 2015). Additionally, as a countermeasure, there should be a legal response where laws are created and be effected against repeat offenders within a given legal jurisdiction.
    Also, the software of the organization must be fixed with bugs and flaws as soon as they are discovered. It has been seen that may cyber attacks destroy data and programs. Therefore, it is essential to back up your information to recover data from an attack quickly. Data backups need to be done for any sensitive information and stored away from the potential attack sites (Loukas, 2015).
    Furthermore, it essential that for any cyberspace, there is automated access control. These controls are managed by passwords. The networks access controls are usually enforced by firewalls (Le, Nguyen, Briand, & Hourte, 2015). Moreover, encryption is also an effective countermeasure in that it hides sensitive information in a way that cannot be easily be read. Therefore, any attempt to modify encrypted data results in indecipherability.
    Additionally, cyber attacks have been observed to interfere with an organization’s network systems. Cybercriminals have been known to use various methods such as viruses to attack the network of a system. Therefore, it is important that we install, use, and regularly update the antimalware and antivirus in each and computer located in the organization. This is important in that it will provide a way that can be used to determine the incoming virus from attacks and hence to destroy them (“Current Trends in Antivirus Protection,” 2015).
    Also, the countermeasure is to obtain hardware of the organizational systems from trusted sources. This is because the systems may have been purchased from untrusted factories and they could also appear duplicated, cloned, unwired, or even has hardware Trojans (McLaughlin, 2011). To prevent this kind of risks, new hardware known as the Trojan taxonomy which has the required capabilities and counters measures that prevent the threats to the organizational systems.
    References
    Adams, M., & Makramalla, M. (2015). Cybersecurity Skills Training: An Attacker-Centric Gamified Approach. Technology Innovation Management Review5(1), 5-14. doi:10.22215/timreview861
    Current Trends in Antivirus Protection. (2015). The Antivirus Hacker’s Handbook, 321-330. doi:10.1002/9781119183525.ch16
    Le, H. T., Nguyen, C. D., Briand, L., & Hourte, B. (2015). Automated Inference of Access Control Policies for Web Applications. Proceedings of the 20th ACM Symposium on Access Control Models and Technologies – SACMAT ’15. doi:10.1145/2752952.2752969
    Loukas, G. (2015). Cyber-Physical Attack Steps. Cyber-Physical Attacks, 145-179. doi:10.1016/b978-0-12-801290-1.00005-9
    McLaughlin, K. L. (2011). Cyber Attack! Is a Counter Attack Warranted? Information Security Journal: A Global Perspective20(1), 58-64. doi:10.1080/19393555.2010.544705