14 Jul 2022

43

Information Security in a World of Technology

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 1714

Pages: 5

Downloads: 0

Cyber-attacks are arguably some of the greatest threats in cyber security. Professional syndicates and hackers have taken up ransomware as a business which they can use to yield significant benefit from unsuspecting companies. At the core of this issue is the issue of extorting funds from the entities in exchange for the decryption of the already encrypted files; with payment delays being tantamount to losing information. Other common means used by hackers are Misconfigured cloud storage buckets and phishing emails. Cyber-attacks have caused serious issues in many organizations and measures ought to be taken to address this. 

Weaponized Ransomware 

Security mechanisms 

Ransomware attacks are very common in the current technology world. Hackers are initiating the attacks by encrypting a user`s vital information and requiring them to submit payment in form of Bitcoins in order for the documents to be decrypted (Ayala, 2016). Weaponized ransomware in an organization setting is capable of causing extensive damage on security mechanisms. For example, in the healthcare sector, the attacks have caused hospitals to turn away patients. While catering for such systems in a bid to protect patients` information, one of the most effective techniques is to ensure that vulnerable files are copied on back up devices. The anti-virus being used also has to be updated (Hebda, Hunter & Czar, 2019). Tools such as anti-malware could also be run to ensure the system is cleaned. If required, the computer can be disconnected from the internet when an attack ensues, before crucial information is stored away. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Administrative Issues 

In order to resolve administrative issues resulting from ransomware attacks, one of the effective techniques to use would be restriction of administrative access. Some of the components of the malware engage the administrator account in order to spread the virus (Ayala, 2016). Also, restriction of code execution would also serve a similar purpose towards resolving the same issue. In such a scenario access to some crucial or sensitive information is only offered to a limited number of people using the same system. This would be effective in keeping the system safe. 

Personnel Issues 

It is important to understand that the existent anti-malware has the potential to block ransomware before it can compromise data. In such a scenario, it is important to ensure that there is no vulnerability that exists in the system. Payloads, is an antivirus which may help to protect personnel issues, however, it does not guarantee security in all instances of ransomware attacks (Hebda, Hunter & Czar, 2019). Also, there are instances where passwords formerly used by previous personnel are still active. This should be avoided to lessen the risk of an attack. Besides, default and blank passwords have to be fixed (Ayala, 2016). 

Level of access Handling 

The level of restriction imposed upon a system could be a determining factor on whether an attack is likely to occur or not. High levels of access handling ensure that crucial information is not retrieved or accessed without user`s knowledge, and, therefore, this could manage to control weaponized ransomware. 

Disposal of Confidential Information 

Organizations are tasked with the responsibility of handling sensitive information. A devastating situation is likely to arise if such details were to fall on the wrong hands. Ransomware attacks require payment to be made failure to which information is deleted over time until the money asked for has been received (Ayala, 2016). To avoid such scenarios confidential information can be protected by requiring individuals not to bring devices to work. For instance, employees are not to carry their personal computers along or use them in storing crucial Company information. This is due to the fact that IT experts in the organization are not in a position to know what is contained in one`s personal devices and hackers being aware of this, consider it as an advantage for them to launch an attack. 

Misconfigured cloud storage buckets 

Security mechanisms 

Cloud storage buckets relate to platforms where large data sets are stored for convenience. Misconfiguration results in a vulnerable system which can be exploited by hackers, who are well aware that very few people know how this can occur. In order to prevent attacks from occurring, the user has to ascertain that they only open information from sources that they acknowledge (Hebda, Hunter & Czar, 2019). For example, if they are sent some document that requires to be opened yet they cannot verify its origin, they should avoid opening it. Hackers are used to sending such documents which when opened expose the computer to the risk of an attack. 

Administrative Issues 

In dealing with this kind of issues, it is important that employees responsible for handling data that is sensitive, be trained on security precautions regularly. In relation to cloud, the situation becomes hard since due to the technology changing consistently over time, members of staff may be unable to handle the new changes thus leading the system to be vulnerable. Hackers take advantage of this, which explains why they rely on misconfigured cloud storage buckets. Besides, the health facilities have to be careful when making a decision on the most preferable cloud vendors (Rios, 2015). Only those who have secured their systems are allowed to provide the services to health facilities and other organizations as well. 

Personnel Issues 

A great majority of the online buckets have little or no access permission at all, and hackers are keen to use this to their advantage. For example, personnel may end up downloading files from online platforms and unknowingly offer access to potential threats which end up disrupting the organization`s system (Rios, 2015). Health research institutes have taken the precaution of securing their information owing to such incidences. The main method to utilize in minimizing this threat is to ensure that that crucial details are obtained from secure sites. 

Issues Level of access Handling 

One of the issues why the misconfiguration of cloud storage buckets ends up affecting the organizations is the response time. For example, when an attack occurs, the handlers of the affected system should report the incident immediately since this will ensure that it is easy to control it from blowing out of proportion (Coronado & Wong, 2014). Besides, policies created by the governing authorities could ensure that more misconfiguration is not tolerated. This could involve the introduction of fines which are presented to the service providers for providing default systems to the users with low levels of security. Besides, those individuals who are fully qualified should be allowed to handle the organization`s records. 

Disposal of Confidential Information 

It is important for the healthcare institutes to consider that their data is not as confidential as they believe it is. They should acknowledge that any person is capable of corrupting their system at any time. Besides, information contained in their servers is disposable in the event of an attack. By backing up such data, in non-online systems, it is possible that it will not be at risk of being exposed (Hebda, Hunter & Czar, 2019). It would also be essential to reduce transfer of data since this makes it vulnerable to hacking and other factors. Shredding of files is also very important prior to their disposal since this would ensure that confidential information is not made available to hackers. Further still, unencrypted devices are to be disallowed to prevent the occurrence of a malware attack. 

Phishing emails 

Security mechanisms 

Phishing emails are malwares that are delivered in form of emails to the recipients` system. A good example of this kind of attack is the sending of URLs containing enticing information which capture the attention of the user. Upon clicking such content, the recipient becomes exposed to an attack. This breach of security is common in hospitals and one way it can be prevented is by adopting anti-phishing and antispyware software to prevent access of such emails (Coronado & Wong, 2014). Also encryption of one`s information is likely to regulate the access of information from their servers in the event that such an attack occurs. 

Administrative Issues 

A successful spear-phishing campaign enables hackers to be aware of who controls the system. They also get to know the technicians responsible for managing it. In addition, they can be able to obtain email credentials belonging to some of the staffers. It is also important to note that a greater portion of phishing emails end up impersonating members of staff at a hospital (Coronado & Wong, 2014). Protection through the update of all systems and application of anti-virus is capable of dealing with this anomaly. This is due to the fact that unprotected computers end up exposing the organization to this kind of attack. 

Personnel Issues 

Phishing emails mostly rely on misleading employees to provide personal details pertaining to the Company. As mentioned above, such emails have the ability to impersonate personnel. This occurs where secret credentials pertaining to the email accounts of such individuals are accessed in the course of an attack (Coronado & Wong, 2014). One method that can prevent unauthorized access to such details is by ensuring that all personnel information is encoded (Ayala, 2016). Also, the workers should only be allowed to work with the devices provided rather than using their own Personal Computers to undertake official matters. They are also expected to remain alert at all times, and be very sensitive when dealing with information from unverified sources. Besides, sharing of the organizations` information to outside sources should be viewed as a violation of the confidentiality policy. 

Issues Level of access Handling 

For a phishing email to be successful, the user is required to offer access, which explains why the hacker has to be creative in designing a compelling URL capable of attraction the personnel`s attention. A vishing attack can also be used whereby an employee is tricked into revealing personal details whereby the callers disguise themselves (Ayala, 2016). High levels of handling are expected to be initiated in order to deal with this issue. For example, one would be required to go through a system of verification before their information is acknowledged by a particular facility. 

Disposal of Confidential Information 

All attachments in the emails sent have to be scanned before being read. In a situation whereby suspicious elements are noted in an email, it ought to be disposed immediately. Also, the recipient is expected not to click on any URLs provided by the sender ( Ayala, 2016 ). This will ascertain that they do not fall prey to hackers seeking to extort information from them. Using the preview pane for unknown emails is also not acceptable since this is also capable of initiating the phishing email. Information also has to be disposed via the right means to ensure that it is not accessed when an attack occurs. 

Based on the above information, it is apparent that cyber-attacks have caused serious issues in many organizations. Information security is indeed a crucial matter that has to be considered in institutions. Hackers are devising creative ways of launching attacks such as through the application of weaponized ransomware attacks, misconfigured cloud storage buckets and phishing emails. Methods such as initiating regular updates on systems and restricting access to systems are paramount in preventing attacks from occurring. Finally, healthcare facilities and other institutions ought to adopt the proposed methods, since this makes it possible for them to limit the occurrence of malware attacks. 

References 

Ayala, L. (2016).  Cybersecurity for Hospitals and Healthcare Facilities . Berkley, CA: Apress. 

Coronado, A. J., & Wong, T. L. (2014). Healthcare cybersecurity risk management: Keys to an effective plan.  Biomedical instrumentation & technology 48 (s1), 26-30. 

Hebda, T., Hunter, K., & Czar, P. (2019). Handbook of informatics for nurses and healthcare professionals (6th Ed.). New York, NY: Pearson. ISBN: 978-0134711010. 

Rios, B. (2015). Cybersecurity expert: medical devices have ‘a long way to go’.  Biomedical instrumentation & technology 49 (3), 197-200. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Information Security in a World of Technology.
https://studybounty.com/information-security-in-a-world-of-technology-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Vaccine Choice Canada Interest Group

Vaccine Choice Canada Interest Group Brief description of the group Vaccine Choice Canada, VCC, denotes Canada's leading anti-vaccination group. Initially, the anti-vaccination group was regarded as Vaccination...

Words: 588

Pages: 2

Views: 146

Regulation for Nursing Practice Staff Development Meeting

Describe the differences between a board of nursing and a professional nurse association. A board of nursing (BON) refers to a professional organization tasked with the responsibility of representing nurses in...

Words: 809

Pages: 3

Views: 191

Moral and Ethical Decision Making

Moral and Ethical Decision Making Healthcare is one of the institutions where technology had taken lead. With the emerging different kinds of diseases, technology had been put on the frontline to curb some of the...

Words: 576

Pages: 2

Views: 89

COVID-19 and Ethical Dilemmas on Nurses

Nurses are key players in the health care sector of a nation. They provide care and information to patients and occupy leadership positions in the health systems, hospitals, and other related organizations. However,...

Words: 1274

Pages: 5

Views: 78

Health Insurance and Reimbursement

There are as many as 5000 hospitals in the United States equipped to meet the health needs of a diversified population whenever they arise. The majority of the facilities offer medical and surgical care for...

Words: 1239

Pages: 4

Views: 439

Preventing Postoperative Wound Infections

Tesla Inc. is an American based multinational company dealing with clean energy and electric vehicles to transition the world into exploiting sustainable energy. The dream of developing an electric car was...

Words: 522

Pages: 5

Views: 357

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration