STUDYSHIELDS ASSIGNMENT HELP

  • Home
  • Blog
  • Courses
    • Child Category 1
    • Child Category 2
    • Child Category 3
    • Child Category 4
  • Services
  • Country
    • Childcare
    • Doctors
  • Home
  • Blog
  • Sample Works
  • Order Now

Tuesday, February 16, 2021

2014 witnessed the rise of the “Internet of Things” (IoT)

 February 16, 2021     No comments   

  2014 witnessed the rise of the “Internet of Things” (IoT), a massive network of interconnected devices (estimated to be about 15 billion) ranging from PCs to toasters, cars, and other household and office devices. The IoT is expected to grow to more than 75 billion devices by 2025.

The number of unsecured IoT devices comprises a target-rich environment for cybercriminals to exploit. The impact of vulnerabilities associated with the IoT can be understood by examining the 2016 distributed denial of service (DDoS) attack targeting Dyn. The Dyn attack was made possible by the large number of unsecured Internet-connected devices, like home routers and surveillance cameras, that make up a large portion of the IoT. The attackers directed thousands of devices that had been infected with malicious code to form a botnet. Individually, these devices are harmless; however, their collective computing power was enough to bring down one of the largest DNS services making up the Internet today.

Lately, there has been a marked rise in global ransomware attacks. In May 2017, a massive ransomware attack in 99 countries infected computers and encrypted data, holding it hostage until the administrators paid to regain control of the devices. The scale of the attack was like nothing seen before, but the real danger was in the targets compromised—16 national health services in the UK were attacked, causing appointment cancellations and emergency room shutdowns. Television and communication organizations in Spain and Russia were compromised, as were universities in China and international shipping companies like FedEx. Law enforcement agencies and private security companies around the globe struggled to stem the progress of the ransomware attack by sharing information about prevention and recovery methods.

These two attacks highlight the real danger we are facing from international cybercrime today and in the future.

Upon successful completion of this assignment, you will be able to:

• Discuss the relationship between national law enforcement agencies and private organizations to combat global cybercrime.

• Demonstrate an understanding of the vulnerabilities associated with IoT as it relates to global cybercrime.

Resources

• Textbook: Cybercrime and Digital Forensics: An Introduction

• Web File: An ISTR Special Report: Ransomware and Business 2016.pdf

• IWU Resources

Background Information

Law enforcement agencies and private security companies around the globe struggle to stem the progress of the ransomware attacks. Understanding how a ransomware attack like “WannaCry” identifies targets, infects machines, and moves throughout the Internet will help us develop strategies to prevent future global ransomware attacks. Ransomware attacks highlight the real danger we are facing from international cybercrime today and in the future. It is critical for organizations that have the responsibility of protecting critical national infrastructure or private corporate networks understand the threats associated with online criminal activity.

Instructions

1. Review the rubric to make sure you understand the criteria for earning your grade.

2. Review the following chapters in the textbook, Cybercrime and Digital Forensics: An Introduction: 

a. Chapter 10, “Online Extremism, Cyberterror, and Cyber Warfare”

b. Chapter 15, “The Future of Cybercrime, Terror, and Policy”

3. Read the file An ISTR Special Report: Ransomware and Business 2016.

4. In a 750- to 1000-word essay, respond to the following: 

a. Choose two key findings from the ISTR report and expand upon the discovery of this information and how it can help aid cybersecurity experts prevent future attacks like “WannaCry.”

b. How can sharing information like this report positively impact the relationship between national law enforcement agencies and private organizations to combat global cybercrime?


  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook
Newer Post Older Post Home

0 comments:

Post a Comment

Click Here to Place order

Popular Posts

  • A “criminal minds” Aileen Wournos individual will be your “patient”
     A “criminal minds” Aileen Wournos individual will be your “patient”  A brief history of the patient including diagnoses (documented or your...
  • CEO Jane Lionel has some hard decisions to make with regard to some of the company’
     CEO Jane Lionel has some hard decisions to make with regard to some of the company’solder hands, and even on the eve of that decision, I be...
  • Problem in Supply Chain
    Problem in Supply Chain Problem 2. (Chapter 11: The Storage and Handling System) Compare the constrast private ownership of storage space to...

Recent Posts

Unordered List

Pages

  • Home

Text Widget

Blog Archive

  • November 2022 (20)
  • October 2022 (50)
  • September 2022 (119)
  • August 2022 (107)
  • February 2022 (501)
  • January 2022 (443)
  • December 2021 (488)
  • November 2021 (1574)
  • October 2021 (28)
  • September 2021 (11)
  • July 2021 (8)
  • June 2021 (15)
  • May 2021 (39)
  • April 2021 (15)
  • March 2021 (303)
  • February 2021 (712)
  • January 2021 (903)
  • December 2020 (2)
  • September 2020 (33)
  • April 2016 (5183)
  • March 2016 (3763)
  • February 2016 (4356)
  • January 2016 (1749)
  • December 2015 (22)
  • November 2015 (147)
  • October 2015 (23)

Sample Text

Copyright © STUDYSHIELDS ASSIGNMENT HELP | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates