Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
1 Source
Style:
Other
Subject:
Management
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 9.72
Topic:

Russian Cyberattacks on Ukraine and U.S.A

Other (Not Listed) Instructions:

Please write in accordance with the standards of "Meets or Exceeds Expectations". If the number of words you write exceeds the number of words I require, I will make additional payment accordingly! This class is very important to me. I hope you can take it seriously and look forward to cooperating with you in the future!
Cyber Risk, Data Breach Identification, and Vulnerability Management

Overview

Data Breach or Cyber Risk Events Research

An organization's most valuable assets, tangible and intangible, are subject to cyber risk. Thinkof a cyber-hack that prevents your retail stores from opening for business or a cyber-hack thatcopies your intellectual property or your latest R&D. IBM's reports chronicle the increasinglypervasive nature of cyber risk since the mid-2000. For 2021, the average data breach cost is$4.24 million, an increase of 10% from 2020; the U.S. is the Highest Country cost, Healthcare isthe Highest Industry cost, and the average number of days to detect and contain a data breachis 287 days. The ransomware and destructive malware have a higher average cost than theoverall average of data breaches (IBM cost of data breach 2021 report, in the readings).DetailsInitial Post:Working independently, research and summarize two recent data breach or cyber riskevents and include relevant details on the threat source. Give a brief summary for each event(one or two paragraphs) and include relevant details on the threat source (what type of threatwas responsible for the breach, for example, spear phishing, system flaws, 3rd party access,supply chain, etc.). In your initial post, please provide credible links or sources to each of theevents that you choose.Note: You may not reuse any of the examples that were discussed in class. You will not beable to read or reply to any other posts until you have written your initial response.Responding to Your Peers:After submitting your initial post, spend some time reviewing the research and summariesprovided by your peers. Do you agree with their analysis? Why or why not? What other threatsources and areas of vulnerability might exist? What other strategies could an organizationemploy to mitigate each threat or area of vulnerability? Reply to one or more of your peers.Assessment:Your work will be evaluated as follows:● Identification and Sources: You correctly identified two Cyber Risk or DataBreach events and provided credible links or sources to each of the selectedarticles.● Research/ Explanation: You thoroughly explained the threat sources and areasof vulnerability and provided mitigation strategies for each.● Writing: You were able to summarize your thoughts in a concise manner that isfree of grammatical and spelling errors.

Other (Not Listed) Sample Content Preview:

Operational Risk Management
Student’s Name
Instructor
Course Title
Date
Russian Cyberattacks on Ukraine and U.S.A
Recently, there have been rumors of hacking activities that may or may not be linked to the conflict between Russia and Ukraine.The use of cyberwarfare is talked about in more detail, which sheds light on a murky part of Russia's invasion of Ukraine.Experts all agreed that Russia would launch major cyberattacks against Ukraine, with the power grid of that country as a likely target.There were many pieces of data that pointed in the direction of this prediction. Reports of smaller forays are appearing, even though large-scale operations have not yet materialized.
On Monday, the world's biggest search engine said it had discovered evidence of extensive phishing attempts targeting government officials and members of the military in Poland and Ukraine. Yet another security company, Resecurity Inc., has produced data revealing a widespread hacking effort against U.S. natural gas-supplying corporations. In both cases, Russia or Russia's allies are possible organizers of the attacks.
According to Google's Threat Analysis Group, the phishing attempt was aimed at Polish and Ukrainian government and military groups in particular, as well as users of the Ukrainian news site UkrNet (TAG). Some of the attackers, like Fancy Bear, were located in Russia, while others, like Ghostwriter, were located in Belarus. This latter group has ties to the Russian military intelligence agency GRU, and they attacked Democratic Party emails in 2016.
Shane Huntley, a blogger, just wrote that in the last two weeks, TAG has seen activity from a wide range of threat actors that we often keep an eye on and are well-known to law enforcement. He gave the examples of criminals Fancy Bear and Ghostwriter as examples. This information is being shared with the security community and users who are t...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These Other Other (Not Listed) Samples: