This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Cybersecurity Attack

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

Cybersecurity Attack

 

Cybersecurity is the practice of attacking computers, server networks, electronic systems, and mobile devices. It is also called information technology security. In 2017 September, a bug exposed users’ contact information and affected a far greater number of Instagram accounts. The bug, which appeared to have been responsible for Selena Gomez’s account being hacked that year, allowed crackers to scrape email addresses and contact information for millions of accounts on Instagram. The company first said the crack was limited to holders of verified accounts, it was noted that non-verified users had been affected. Hours after the hack was exposed, hackers established a searchable database that they named Daxagram, which allowed users to search for victims’ contact information for $10 with every search. (An Instagram hack hit millions of accounts, and victims’ phone numbers are now for sale, 2020)

CIA triad is information security that keeps data secure, integral, and available to users. CIA triad applies in many ways to this event; one of its uses is by keeping user’s accounts confidential. Only authorized users and processes should access or modify data; hence data is private to the user. CIA trial also keeps data mentioned in a correct state, and nobody should be able to improperly change it, either accidentally or maliciously.  Besides, the CIA triad also applies to this event by account available to authorized users whenever the user needs to do so. (Fruhlinger, 2020)

 

 

 

 

 

 

 

McCumber Model is a tool developed by john McCumber, who is one of the early cybersecurity experts. The cybersecurity cube has three dimensions, which look somewhat like a Rubik’s cube. The first dimension of cybersecurity cube identifies goals to shield cybersecurity. The purposes that are placed in the first dimension are the foundational principles. These three principles are confidentiality, integrity, and availability, commonly known as CIA Triad. Confidentiality prevents disclosure of information to unauthorized people, processes, or resources, whereas integrity refers to the accuracy, trustworthiness, and consistency of the data. Availability ensures that data is always available to authorized users when they need it. Cybersecurity cube identifies three types of skills and also discipline used to provide protection. First skills include the technologies, products, and devices available to defend the information system and defend off cybercriminals. However, McCumber reminds cybersecurity professionals who always have a reputation for mastering technological tools at their disposal, that specialized tools are not enough to protect cybercriminal. Finally, cyberspace users must strive to be more knowledgeable about cyberspace and establish a learning and awareness culture. (The Three Dimensions of the Cybersecurity Cube – Swan Software Solutions, 2020)

Identify is the first of the NIST framework; this acts as a foundation of all other activities. Identity plays a role in increasing transparency to the solutions used and helps in prioritizing actions that protect systems. The next framework function is to watch. Protect is used in reducing the number of cybersecurity events that can occur in organizations and limit the impact. If you don’t protect your data, you not only lose your business but also be subjected to fines or jail time if you don’t know compliant with government regulations—there chances of data breaches due to human error or cybersecurity. Regardless of the Couse, detect function outlines how you can develop and implement measures to help detect. The final function is recovered. This involves the step company takes in the aftermath of a cybersecurity event.  As the organization works on the recovery function, you will develop and implement a plan for the resilience and restoration of any system or solution that was impaired by the data breach. While information technology security protects both the digital and physical data, cybersecurity protects the digital on your networks, computers, and devices from authorized access and destruction. (Do you worry about cyber safety? Learn some smart defenses., 2020)

 

REFERENCE

 

 

  . An Instagram Hack Hit Millions Of Accounts, And Victims’ Phone Numbers Are Now For Sale. [online] Available at: <https://www.theverge.com/2017/9/1/16244304/instagram-hack-api-bug-doxagram-selena-gomez> [Accessed 26 August 2020].

Cybersecurity Framework. (2020). Retrieved 27 August 2020, from https://www.nist.gov/cyberframework

ruhlinger, J., 2020. The CIA Triad: Definition, Components, And Examples. [online] CSO Online. Available at: <https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html#:~:text=The%20CIA%20%28Confidentiality%2C%20Integrity%2C%20Availability%29%20triad%20is%20a,and%20policies%20aimed%20at%20keeping%20its%20data%20secure.> [Accessed 27 August 2020].

 Swan Software Solutions. 2020. The Three Dimensions Of The Cybersecurity Cube – Swan Software Solutions. [online] Available at: <https://swansoftwaresolutions.com/the-three-dimensions-of-the-cybersecurity-cube/> [Accessed 27 August 2020].

Us.norton.com. 2020. Do You Worry About Cyber Safety? Learn Some Smart Defenses.. [online] Available at: <https://us.norton.com/internetsecurity-malware-what-is-cybersecurity-what-you-need-to-know.html> [Accessed 27 August 2020].

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask