Combo Offer 35% Off + 10% Extra OFF on WhatsApp

Introduction To Computer Systems, Networks And Security Assignemnt Sample

  • Plagiarism & Error Free Assignments By Subject Experts
  • Affordable prices and discounts for students
  • On-time delivery before the expected deadline

No AI Generated Content

72000+ Projects Delivered

500+ Experts

Enjoy Upto 35% off
- +
1 Page
35% Off
AU$ 11.83
Estimated Cost
AU$ 7.69
Securing Higher Grades Costing Your Pocket? Book Your Assignment At The Lowest Price Now!
X

PART 1 - Analyze a cybersecurity vulnerability or incident

Access Free Samples Prepared by our Subject Matter Experts, known for offering the Best Online Assignment Help Services in Australia.

1. Summary

A continuous malware operation connected to threat actors believed to possess links to China has been revealed in a recent analysis by security company Mandan. The virus in the promotion persists on uncorrected SonicWall SMA (Secure Mobile Access) machinery even after firmware improvements. The attackers have put a lot of effort into ensuring that their malicious equipment is reliable and persistent. This virus looks to be intended to gather all registered users' securely hashed passwords while offering a web shell via which the attacker may install other malware. The attacker gains extremely powerful access to the compromised machines, as well as a number of scripts for bash and a TinyShell variation. The findings show an ongoing sequence of assaults in this area and are consistent with previous acts by Chinese threat actors targeting network devices that are visible on the Internet. The Mandiant links a group identified as UNC4540 to the continuous assaults on SonicWall SMA 100 users.

2. Identify which software, hardware, or system is affected

According to the researcher's analysis, SonicWall SMA (Secure Mobile Access) appliances, a kind of hardware solution intended for secure remote network accessibility, are the specific focus of the malware attack (He et al, 2020). The malware targets these electronic devices in an attempt to penetrate them and stay within even after firmware improvements. Because of the malware's malicious operations, SonicWall SMA appliances' security and function have been affected, possibly opening an opportunity for illegal access and data theft. These organizations that utilize SonicWall SMA Appliances need to be conscious of this risk and take the necessary precautions to secure and update their computer systems.

3. Problem Description

Unauthorized Access

Malware may provide unauthorized users access to networks and systems, which increases the potential of data theft, system compromises, and breaches of private information (Jaramillo, 2019).

Data Loss

Malware can alter, remove, or steal personal information, resulting in revenue losses and bad press for anyone or business.

Disruption

There is malware that has been designed to restrict the system's operation, which leads to delay in work, lower output, and financial harm.

Cyber destruction

Some types of viruses are specifically created to collect and steal private information for malicious purposes.

Propagation

Malware can propagate quickly over networks, affecting a variety of devices thereby rendering removal and management challenging.

Financial Fraud

Stealing an identity, credit card fraud, and online banking hacks are instances of financial fraud that are frequently carried out using malware.

4. Discuss serious the issue, weakness, attack

4.1 Technical level

A technical system's weakness or vulnerability is an important issue since it gives attackers an opportunity of entry for attack. Attackers have the ability to disrupt operations, obtain unauthorized access, and execute malicious software when they identify and take advantage of these types of vulnerabilities (Kleymenov, & Thabet , 2022). Hacking of data, monetary losses, and system failures could come from this. Systems grow more vulnerable to possible attacks when these flaws are overlooked or disregarded, increasing the risk of safety breaches and resulting functioning, financial, and data damage.

4.2 Human behavior

In the area of cybersecurity, human behavioral weakness is a major and prevalent problem. Vulnerabilities involve disclosing private information without authorization, employing weak or simple passwords, suffering from scams using email addresses, and not updating software and hardware (Meland et al. 2021). These actions give hackers areas of vulnerability to exploit, which facilitates their ability to breach security, acquire unauthorized access to networks, and steal personal data. It is essential to address this human component because technology defenses on themselves are insufficient. It is essential to promote best practices in cybersecurity, education, and awareness in order to reduce the human vulnerabilities that hackers regularly take advantage of.

4.3 Policy level

Policies of an organization that are weak or vulnerable can result in a number of security thefts, which is an important issue. Inadequate incident response strategies, subpar data handling practices, and insufficient access limitations are instances of policy mistakes. Such flaws may lead to legal problems, data breaches, and compliance violations (Naseer, Maynard, & Desouza, 2021). To protect sensitive data and uphold stakeholder trust, policies must be reinforced and compliance must be ensured. An organization runs a chance of experiencing serious financial and reputational implications if policy-level errors are not addressed.

5. Conclusion

To conclude this, effective cybersecurity requires addressing policy shortcomings and malware vulnerabilities. Protecting systems, data, and privacy requires constant surveillance and preparation due to the always changing threat environment. Protecting against possible violations of financial damage, and negative publicity requires taking crucial precautions like minimizing malware risks and strengthening rules. Setting priorities for cybersecurity is essential for organizations to stay relevant in the constantly developing digital landscape while maintaining trust and honesty.

References

Journals

  • He, W., Ash, I., Anwar, M., Li, L., Yuan, X., Xu, L., & Tian, X. (2020). Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training. Journal of intellectual capital, 21(2), 203-213. Retrieved from: https://drive.google.com/file/d/1H1gaJUnCFO7yReHUdKni33Yxl2XWBBub/view Retrieved on [18/10/23]
  • Jaramillo, L. E. (2019). Malware threats analysis and mitigation techniques for compromised systems. Journal of Information Systems Engineering & Management, 4(1). Retrieved from: https://www.jisem-journal.com/download/malware-threats-analysis-and-mitigation-techniques-for-compromised-systems-5742.pdf Retrieved on [18/10/23]
  • Kleymenov, A., & Thabet, A. (2022). Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks. Packt Publishing Ltd. Retrieved from: Retrieved on [18/10/23]
  • Meland, P. H., Bernsmed, K., Wille, E., Rødseth, Ø. J., & Nesheim, D. A. (2021). A retrospective analysis of maritime cyber security incidents. Retrieved from: http://cdn.ttgtmedia.com/rms/editorial/bookshelf-masteringmalwareanalysis-excerpt.pdf Retrieved on [18/10/23]
  • Naseer, H., Maynard, S. B., & Desouza, K. C. (2021). Demystifying analytical information processing capability: The case of cybersecurity incident response. Decision Support Systems, 143, 113476. Retrieved from: https://eprints.qut.edu.au/211762/1/88202976.pdf Retrieved on [18/10/23]
Recently Download Samples by Customers
scan qr code from mobile
Get best price for your work
  • 72000+Project Delivered
  • 500+ Experts24*7 Online Help
  • AI-FreeContent
  • UnlimitedRevision

Get Extra 10% OFF on WhatsApp Order

© Copyright 2024 | New Assignment Help | All rights reserved