here are two graphs presented from the CERT on reported incidents and vulnerabilities. Keep in mind the difference between an incident and vulnerability. While these charts are dated they still provide valuable trend information that contin

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

There are two graphs presented from the CERT on reported incidents and vulnerabilities. Keep in mind the difference between an incident and vulnerability. While these charts are dated they still provide valuable trend information that continues to rise. Today, both security incidents and security vulnerabilities continue to rise for a variety of reasons.

What reasons can you provide for the continuing upwards trend in the number of incidents reported? You should provide at least four (4) reasons with supporting data and reasoned arguments to support your answer. Good answers will provide facts, reasoned arguments and references that go beyond anecdotal information.

Explain using facts, reasoned arguments and references that go beyond anecdotal information and link sources.

140000
130000
120000
110000
100000
90000
80000
70000
60000
50000
40000
30000
20000
10000
0
6000
5500
5000
4500
4000
3500
3000
2500
200
1500
1000
500
0
1995 1996 1997 1998 1999 2000 2001 2002 2003
→ Incidents reported
1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005
Vulnerabilities
reported
Transcribed Image Text:140000 130000 120000 110000 100000 90000 80000 70000 60000 50000 40000 30000 20000 10000 0 6000 5500 5000 4500 4000 3500 3000 2500 200 1500 1000 500 0 1995 1996 1997 1998 1999 2000 2001 2002 2003 → Incidents reported 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 Vulnerabilities reported
Expert Solution
Step 1
Facts regarding upwards trend in the number of incidents reported :
1. Hacking Attacks Are on the Rise :
According to recent data, there is an attack every 39 seconds. It's one of the cyber security statistics that's sure to keep any entrepreneur up at night.
  1. Government, Technology, and Retail Are Some of the Most Affected :In 2016, an estimated 95% of all breached records came from these three sectors. This is largely due to the large amount of data stored by these organizations, as well as the sensitive nature of such information.
  2. Data Breaches Are Extremely Costly :
  3. cber attacks will cost companies $10.5
trillion per year by 2025.
4. Small Businesses Are Especiall
Vulnerable : fact that, 43% of all cyber attacks are directed at small businesses. For anyone running a small business, it is critical to take data protection seriously and invest in robust cyber security measures that can keep your organization safe.
5.Covid-19 Led to an Increase in Attacks :there was a 300% increase in attacks right after Covid-19 began to spread.
6. Human Errors Are Responsible for Most Breaches : fact, 95% of all data breaches occur as a result of human error. These errors range from clicking on dangerous links to falling for email scams.
 
 
 
Reasoned arguments:
previous, Unpatched Security Vulnerabilities :
For years, data security specialists are assembling data on the exploitations that hackers have with success used on corporations in dozens of nations. These exploits square measure sorted into many Common Vulnerabilities and Exposures (CVEs) to spot them for future reference.
However, several of those security vulnerabilities go unfixed for long periods of your time. as an example, in line with Verizon's 2015 information Breach Investigations Report, "99.9% of the exploited vulnerabilities had been compromised quite a year once the associated CVE was printed." Leaving these previous security vulnerabilities unfixed provides hackers a free pass to your company's most sensitive data.
Human Error :
Unfortunately, one among the most important sources of a knowledge breach isn't some unknown or forgotten security bug, it's human error.
According to statistics from a CompTIA study cited by shrm.org, "Human error accounts for fifty two % of the basis causes of security breaches." the precise nature of the error could vary, however some situations include:
The use of weak passwords;
Sending sensitive data to the incorrect recipients;
Sharing password/account information; and Falling for phishing scams.Many of those human errors is prevented by ensuring staff apprehend their basic information security measures. As expressed within the SHRM article, "experts usually say a lot of worker coaching is required to handle the 'human firewall' issue."
 
 
Malware:
Malware isn't simply a retardant for private computers at the homes of staff, it's associate degree ever-expanding threat aimed directly at your company's systems. in line with the Verizon DBIR 2015, "5 malware events occur each second."
While several of those "malware events" square measure minor in nature, the sheer range of those events is worrying. Also, there exists an out of this world quantity of variation between malware samples.As observed within the Verizon DBIR, "we found that seventy to ninetieth (depending on the supply and organization) of malware samples square measure distinctive to one organization." Despite this reality, several malware programs hail from simply a couple of totally different
"families." in line with Verizon, "20 families diagrammatic regarding seventieth of all malware activity."Why? the most reason is that a lot of hackers build minor modifications to existing malware programs to do and build them unidentifiable to antivirus programs whereas still manufacturing the meant result by the hacker.
corporate executive Misuse :
While closely associated with human error, this explanation for company information is a lot of insidious in nature. Human error implies associate degree innocent accident or mistake. corporate executive misuse, on the opposite hand, is that the deliberate abuse of your company's systems by a licensed user, generally for private gain.
As observed in Verizon's 2015 DBIR, "it's all regarding grabbing some straightforward
Benjamins for these mendacious malefactors, with gain and convenience being the first motivators (40% of incidents)."
The issue here is that the malicious actor is somebody in whom your organization has placed trust. Worse yet, as observed by Verizon's report, "catching corporate executive abuse isn't easy... in several of the incidents we tend to reviewed, the corporate executive abuse was discovered throughout rhetorical examination of user devices once people left an organization."

Explanation: preventing corporate executive abuse is almost not possible, injury is restricted through compartmentalization of knowledge on your network or cloud. the less files and systems one user will access, the more durable it's for them to abuse their access.

However, it may also build sharing of necessary information harder additionally.
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Follow-up Questions
Read through expert solutions to related follow-up questions below.
Follow-up Question

Can you please not use an answer from another website? Thank you!

Solution
Bartleby Expert
SEE SOLUTION
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY