Sign In
Not register? Register Now!
Pages:
1 page/≈275 words
Sources:
Check Instructions
Style:
APA
Subject:
Communications & Media
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 4.46
Topic:

US communications and Hackers. Communications & Media Essay

Essay Instructions:

1. How should the U.S. government respond to a hacking attack by China in which the hackers shut down critical military communications for several hours? Please be sure to give at least 3 supported actions.
Kindly read Chapter 5 of samebook.

Essay Sample Content Preview:

US Communications and Hackers
Student Name
Institution Affiliation
There have been several reports alleging that the Chinese government has been regularly involved in hacking and gaining unauthorized access to the computer systems of many US organizations including the US military. There are several ways that the US government in the case that hackers succeed to shut down critical military operations for several hours.
Firstly, the US government should immediately switch to its incident response plan. Institutions such as the military usually have detailed incident response plans on ways that help to prevent further damage and loss (Cisco, 2020). These could include a complete destruction of all computer devices to deny further access to the hackers who may shut down some operations to ensure that they steal as much data and information as possible (Cisco, 2020). The incident response plan also documents the team members who will be responsible for communicating with internal and external partners (Baase, 2013). There is usually a lot of confusion during such periods and it is essential that a specific person communicates with the media, law enforcement agencies, and other stakeholders about the incident and the plans in place to rectify the situation as soon as possible. A proper documentation of the incident response plan will highlight how the hacking incident was contained, eradicated and operations resumed to normal (Cisco, 2020). As such, it will provide a learning platform that will prevent the incident from happening in the future.
Secondly, a penetration testing should be performed immediately. According to Stergiopoulos & Gritzalis (2015), “Penetration testing is also known as pen testing and views your ne...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to animal testing:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!