Target of a Network or System Intrusion | Instant Homework Help

Module 1 Discussion QuestionSearch “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusionwithin the past 5 years?What information was targeted? Was the attack successful? If so, what changeswere made to ensure that this vulnerability was controlled? If not, what mechanisms were in place to protect against the intrusion?You must write about a real-life network/system attack that you found through your internet research. Failure to discuss a targeted attack and cite/reference the news source will result in a 0 for this entire discussion.I am adding my classmate’s response for the above question. You will have to write response for each post in 150 words. No references needed.Discussion 1:Technological growth and the internet age has brought with it increased cases of cybercrimes where cybercriminals target personal information of governments, private firms, and even individual consumers. The value of data and its sensitivity to persons who own it have made cybercrimes and system intrusions very costly for the victims.In 2017, Equifax broke the news of the system intrusion it had suffered as a company and the resultant exposure of data for approximately 143 million citizens of the United States. The other citizens who had been affected were UK citizens and Canadians, whose specific numbers were not revealed. The breach was noted to have affected online web application only with core consumer database untouched. The information targeted the names, dates of birth, residential addresses, social security numbers, and driver’s license numbers of the consumers.The company responded to the breach by setting up a website from which customers would be able to tell if they were affected and the potential impact that it may have if their data was accessed (Nurse, 2017). Other measures included the company asking customers to register with their TrustedID premiere, which is a service used in credit monitoring from which they had to agree to a compulsory arbitration clause that would not apply to claims that may have originated from the security breach.In the wake of the attack, and in a bid to forestall such attacks in the future, Equifax employed a new chief information security officer and rolled out comprehensive efforts to change their approach to data security. Equifax also invested more than $200 million on infrastructures that would help in securing user data, and the chief information security officer since reiterated that the company had allocated him enough resources to ensure they build hack-proof security systems. The company in the process prioritized fundamentals, and essential projects first given the need for an overhaul of most systems like vulnerability management and patching processes.Discussion 2:A network intrusion system from being hijacked and used, the computer equipment must have the ability to be disconnected from the network. The type of computer equipment used is very important. The most common computers used in intrusion systems are laptops which run Windows operating system. In this case, the network intrusion system would monitor the laptops which are connected to the network but it would not be able to determine any identity of the computers that are being used in the network. When a computer is not present in the network and a computer is not in the network, the intrusion system does not interfere with the operation of the network. (Alhadad, R. 2019).A network intrusion system to be successful, there must be an entry in the intrusion database called network intrusion. This entry has to contain detailed information like IP address, MAC address, hostname, ports that are used, and all the traffic traffic that is flowing through that entry. This is an attack scenario when the attack has a purpose, and has an objective, and has a target. In an attack situation, this is a threat scenario. In an intrusion scenario the attack is carried out by a hacker using malware, or a Trojan, on a computer. The computer has become compromised. Once the computer has become compromised, the hacker enters the network and creates the network intrusion rules on the compromised computer. The computer can now be used as a target for an attack. DANE This is an intrusion system that intercepts the data traffic on the network. It looks the computers, then sends the information in the email. This is the system that can be used for monitoring the computers that are being monitored. If the intrusion system detects any login attempts from unauthorized computers, it is supposed to shut down the unauthorized users. This way, the intruder will not be able to break into your network and compromise your personal data. Network intrusion systems are very useful in preventing and containing network intrusions. These intrusion systems are installed on computers that are connected to the local network and to the internet via a firewall or router. (Poornachandran, P. 2018).

Don't use plagiarized sources. Get Your Custom Essay on
Target of a Network or System Intrusion | Instant Homework Help
Get a 15% discount on this Paper
Order Essay
Quality Guaranteed

With us, you are either satisfied 100% or you get your money back-No monkey business

Check Prices
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know that being a student these days is hard. Because of this, our prices are some of the lowest on the market.

Instead, we offer perks, discounts, and free services to enhance your experience.
Sign up, place your order, and leave the rest to our professional paper writers in less than 2 minutes.
step 1
Upload assignment instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
s
Get personalized services with My Paper Support
One writer for all your papers
You can select one writer for all your papers. This option enhances the consistency in the quality of your assignments. Select your preferred writer from the list of writers who have handledf your previous assignments
Same paper from different writers
Are you ordering the same assignment for a friend? You can get the same paper from different writers. The goal is to produce 100% unique and original papers
Copy of sources used
Our homework writers will provide you with copies of sources used on your request. Just add the option when plaing your order
What our partners say about us
We appreciate every review and are always looking for ways to grow. See what other students think about our do my paper service.
Nursing
Thanks
Customer 452521, May 13th, 2021
Human Resources Management (HRM)
Thanks.
Customer 452701, August 15th, 2023
Other
Excellent like always
Customer 452813, January 5th, 2025
Nursing
Excellent work!! Thanks again!
Customer 452707, October 14th, 2022
Nursing
Always perfect!!! Don is the best!
Customer 452453, July 27th, 2021
Criminal Justice
Impressive! Will be using the service again.
Customer 452485, December 5th, 2021
Other
OK
Customer 452813, July 3rd, 2022
Social Work and Human Services
Awesome Work!
Customer 452587, October 20th, 2021
Other
awesome
Customer 452813, July 2nd, 2024
Nursing
This is great! Thank you
Customer 452679, December 16th, 2021
Professions and Applied Sciences
Amazing work!
Customer 452707, May 29th, 2022
Professions and Applied Sciences
Thank you!
Customer 452707, March 4th, 2022
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.