Saturday, December 7, 2019

Cyberattack Ukraine Spreads Internationally -Myassignmenthelp.Com

Question: Discuss About The Cyberattack Ukraine Spreads Internationally? Answer: Introducation Cloud Computing- The concept of cloud computing is considered as the most important in the sector of Information Technology. Cloud computing has entered the technological industry like a storm. The total revenue that is estimated for the private and the public hardware of cloud, services, and software generally amounts to a total of 180 billion dollar, which is 16 % of the total IT industry. In last few years, the demand of cloud has tremendously increased to a total of 70 % of the total growth in IT sector and it is expected to grow to about 60 % by the year of 2020 (Avram, 2014). There are many advantages of using cloud computing in organizations and for personal practices. Cloud computing helps to create new era of services and products within the operations. Without the cloud, organizations are not able to give new services and products to their customers. The traditional outsourcing of the Internet Technology does not provide agility as cloud computing does. Cloud computing also controls all the traditional outsources which does match in most of the part (Rittinghouse Ransome, 2016). Cloud computing also gives rise to new leaders in the IT industry and also gives rise to IT vendors. Threats of Cloud Computing- Even though cloud computing provides many advantages for data in an organization, it also has many security issues that are involved in the organization. The security threats that comes from cloud computing are data breaches, cloud generally has weak identity and has weak access and credential management in the organization. Cloud Computing is also prone to data loss and also has issues on shared technology. A posted by Reuters and The New York Times, on 21st June Wednesday, a new virus was spread to damage a large amount of data around the world (Perlroth, Scott Frenkel, 2017). The virus that was spread crippled many computers, disrupted all the ports from Ukraine, city of Mumbai to the city of Los Angeles, and finally stopped in Australia at a chocolate factory. In Ukraine, the virus was first spread on Tuesday which affected all the computer systems silently only after the users has downloaded the accounting package of tax or the user visits a news site. The virus was stuck for more than a day and the companies all around the world were struggling to come out of the attack (Batcheller et al., 2017). The experts were also not able to find out a way to come out of the attack. The shipping giant of Danish, A.P. Moller of Maersk said that they found it difficult to process the orders and also shift their cargoes. This congested near about 76 ports all around the world that are run by the subsidiary of APM Terminals. The FedEx Corp of the United States said that the TNT Express part of its company was significantly affected by virus which has spread all along South America affecting the ports operated by China Cofco in Argentina. The code of the virus locked all the machines and also demanded for an amount of 300$ bitcoins from the victims. If they deny to give the ransom, the victims are to lose all their data same as the previous WannaCry ransomeware that was held in May (Srinivasan, 2017). Almost 30 victims paid the amount of money. But seeing the less amount of money, the experts were confused that weather the motive of the attacker was only to gain financially or they were attacking for destruction motive. The attackers instructed to the victims to get them notified when the ransom is paid through emails. The main aim of the attack was only to disrupt the system other than the ransom only. The malware that was detected was variant of all the past campaigns that were derived from a code known as the Eternal Blue which was developed by the NSA (National Security Agency) in U.S. After the WannaCry attack, the security firms, industrial groups, and the government advised the business groups and the consumers to have Microsoft security patches (MSFT.O) in their computers (Mansfield-Devine, 2017). The security firms which include Cisco Talos, Microsoft, and the SYMC.O (Symantec) said that some of the initial infections were completed by them when the malware was transferred to the users of Ukraine tax program software known as MEDoc. After gaining money in Ukraine, the malware was spread all over the corporate network to gain more amount of money. References Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia psychology,12, 529-534. Batcheller, A., Fowler, S. C., Cunningham, R., Doyle, D., Jaeger, T., Lindqvist, U. (2017). Building on the Success of Building Security In.IEEE Security Privacy,15(4), 85-87. Mansfield-Devine, S. (2017). Ransomware: the most popular form of attack.Computer Fraud Security,2017(10), 15-20. Perlroth, N., Scott, M., Frenkel, S. (2017). Cyberattack Hits Ukraine Then Spreads Internationally.The New York Times. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Schauer, S., Stamer, M., Bosse, C., Pavlidis, M., Mouratidis, H., Knig, S., Papastergiou, S. (2017). An adaptive supply chain cyber risk management methodology. Srinivasan, C. R. (2017). Hobby hackers to billion-dollar industry: the evolution of ransomware.Computer Fraud Security,2017(11), 7-9.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.