Looking more in Depth with Cyber Attacks

Search 1:

Database: Computer Source

  • Boolean Terms: Cyber Attacks and Business
  • Results: Using the Boolean search term led to 217 results. The filters I used were Peer-Reviewed Journals, publication date 1999 – 2022, and Full-Text Documents.
  • Usefulness: The search yielded a slew of results, but what I was looking for was an article about cyberattacks against businesses. However, I came across the following article, which describes how corporations invest in network security.
  • Subject Terms:

Cyber terrorism

Computer Crimes

Security systems.

Annotation:

Scruton, Alex. “Why Taking Direct Cyber Action Is a Risky Business for Ukraine’s Volunteer Hackers.” 15 Mar. 2021.

This article by Alex Scruton explains why Ukraine’s volunteer hackers are risking their lives by conducting direct cyber action. In an early initiative, the government of Ukraine led the creation of a volunteer information technology army to execute cyber strikes against Russian targets.

Search 2:

Database: Computer Source

  • Boolean Terms: Data Breach and Vulnerability
  • Results: Using the Boolean search term led to 310 results.
  • Usefulness: I was able to find what I was looking for when making my search. However the article I found talks about the file sharing risk, and how the information can fall into the wrong hands if not protected.
  • Subject Terms:

Computer Security

Internet Security

Security systems.

Annotation:

Johnson, Eric M. “Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain.” 23 Aug. 2019.

There are many distinct sorts of information security risks that businesses must deal with. One of the most common types of recent security breaches is the inadvertent leaking of important corporate information. In this paper, we look at an example of this problem: unintended disclosures via peer-to-peer file-sharing networks. Using a direct study of leaked papers, we characterize the scope of the security risk for a group of significant financial organizations. We also examine search trends in peer-to-peer networks to characterize the risk of loss. Our findings show that huge financial institutions face a significant danger as well as a significant vulnerability. We discover a statistically significant correlation between leakage and leak sources such as the number of retail accounts held by the firm. There is also a correlation between corporate visibility and threat activity, according to our findings.

Search 3:

Database: Computer Science Collection

  • Boolean Terms: Cyber Awareness and Internet Security
  • Results: Using the Boolean search term led to 115 results.
  • Usefulness: This search yielded positive results. The article I found is about cyber-security awareness, and it’s similar to but not the same as the one I read earlier this semester.
  • Subject Terms:

Cyber threat

Computer Criminals

Security systems.

network security

Annotation:

“Securing information in a boundless world is virtually impossible: Debasish Mukherjee, Vice President, Regional Sales APAC, SonicWall Inc.” Express Computers, 25 Mar. 2022, p. NA. Gale OneFile: Computer Sciencelink.gale.com/apps/doc/A698238141/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=d620f0a2. Accessed 10 Apr. 2022.

Cybercriminals today use a much more targeted strategy than in the past, with purposeful reconnaissance, planning, and execution. As a result, there will be more victims and greater ransoms. Endpoint detection and remediation (EDR) and network detection and response (NDR) tools, which will improve SecOps teams’ visibility, should be used by security and risk leaders. This will assist businesses in tracking and detecting user, app, device, and network behavior patterns.

Leave a Reply

Your email address will not be published. Required fields are marked *