Discussion-1 Comments in 100 words with a reference.

Discussion-1 Comments in 100 words with a reference.

In simple terms, cyber attack is basically an attack that is usually launched from one computer to one or more computers. There are mainly two motives of the cyber attacks from which one is focused over disabling the targeted computer and the other is accessing the data from the targeted computer. There have been various incidents where cyber attacks have been done by one or the other motive. In the case of Equifax which is a credit company based in America suffered from the cyber attack in the year July 2017. During this attack, the information of 143 million customers were used by the cyber attackers that contained information like birth dates, credit card numbers as well as social insurance numbers (Berghel, 2017). The complaints were also registered against the Equifax company and against those suspicious insiders.

Don't use plagiarized sources. Get Your Custom Essay on
Discussion-1 Comments in 100 words with a reference.
From as low as $9/Page
Order Essay

Information governance is basically the technologies, processes, policies, strategies as well as controls of an organization that helps in optimizing the information due to which business requirements are met and helps in minimizing the risk. The  team that is combined with great management level can help in reviewing the need of information in an organization and on the basis of this decision should be undertaken about the information access and it accountability (Rastogi, 2017). The collaboration of new and advanced type data might makes it tricky for the information governance, but making sure of the information accessibility and its accountability can definitely help in preventing the cyberattacks.

References

Berghel, H. (2017). Equifax and the Latest Round of Identity Theft Roulette. Computer50(12), 72-76. doi: 10.1109/mc.2017.4451227

Rastogi, N. (2017). Online censorship, cyberattacks, and access to information. XRDS: Crossroads, The ACM Magazine For Students23(3), 42-44. doi: 10.1145/3055517

Discussion-2 Comments in 100 words with a reference.

Supply chain attack to the Asus and Notpetya

It refers to a genuine software vendor that pushes out what originally looks like a trusted software update to subscribers while in real sense it is a destructive instrument of cyberwar. A recent example of a supply chain attack can be traced back to the Notpetya attack which happened in 2017. It came to reality when Russian hackers spread destructive malware by manipulating or compromising the updates. It has been on the rise until now 2019. In 2018, Asus, computer makers exposed a supply chain attack around midyear. live updates were compromised by the malware which affected almost a million clients. The attackers disguised themselves as genuine Asus via their certificate, this made victims accept the tainted software. Though a big number was affected, they target around 600 which were later attacked with the second-stage attack.

Information governance to counter cyber security

Information governance prevents or minimizes the chances of cyber-attacks by the role it plays in ensuring that information is safe from compromise and ensures adherence to the three principles of integrity, availability, and confidentiality TC. & Simoes,2019). Without proper governance, the information would leak to outsiders hence compromising the confidentiality, and general IT principles. These principles by information governance help in solving the challenges of cybersecurity in which companies invest in security measures as a form of precautions.

Via regulatory sanctions, globally recognized regulators impose big fines and sanctions in the case of privacy and data breaches. There are also guidelines set for organizations in their conduct in audit and reviews and compliances to the regulations This cost which might be incurred in fines and sanctions makes IT organizations to and improve on tactics to fight or prevent risks associated with threats and cybersecurity at large (TC. & Simoes,2019). 

References

T C., & Simoes, P. (2019). ECCWS 2019 18th European Conference on Cyber Warfare and Security. Academic Conferences and publishing limited.

 

How to place an order?

Take a few steps to place an order on our site:

  • Fill out the form and state the deadline.
  • Calculate the price of your order and pay for it with your credit card.
  • When the order is placed, we select a suitable writer to complete it based on your requirements.
  • Stay in contact with the writer and discuss vital details of research.
  • Download a preview of the research paper. Satisfied with the outcome? Press “Approve.”

Feel secure when using our service

It's important for every customer to feel safe. Thus, at The Homework Writings, we take care of your security.

Financial security You can safely pay for your order using secure payment systems.
Personal security Any personal information about our customers is private. No other person can get access to it.
Academic security To deliver no-plagiarism samples, we use a specially-designed software to check every finished paper.
Web security This website is protected from illegal breaks. We constantly update our privacy management.

Get assistance with placing your order. Clarify any questions about our services. Contact our support team. They are available 24\7.

Still thinking about where to hire experienced authors and how to boost your grades? Place your order on our website and get help with any paper you need. We’ll meet your expectations.

Order now Get a quote