Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Question
Suffolk County is geographically located on the Eastern half of Long Island, NY. It has a population of approximately 1.5 Million people, making it one of the larger ones in the State. In 2021, attackers compromised some of the county government’s systems and took residence on them for an extended period of time. This case study explores the cause of the breach, as well as its impact on county government, and on the residents of Suffolk County.
Instructions
For your assignment this module, complete the following:
- Review two acticles about the Suffolk County Breach Case Study and Ransomware attack that forced a New York county back to pen and paper began in 2021, official says.
- Answer the following questions:
- What was the impact of the breach to the county government ability to operate?
- How expensive was dealing with the aftermath of the breach? Is that in line what you would have guessed?
- What was the impact of the breach to the county’s residents?
- How much time elapsed between the start of the attack and its discovery?
- What was attributed to the attack? What is their motivator?
- What government agencies and professional organizations were involved in responding to the breach?
- What was the root cause of the breach? Were people held accountable?
In your answers, use the terminology introduced this module.
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 3 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Your employer has just implemented a new security policy that requires all workers to utilize fingerprint readers, rather than their login and password, whenever they use company-issued computers. In an effort to access your account over the weekend, you sliced your finger while entering your password. The result is that your fingerprint cannot be read by the computer. You can't use the computer right now because of this issue. What do you see in store for yourself down the road?arrow_forwardArtemis Financial is looking to encrypt their archive files and they need advice from you, as the developer and security expert, on employing best practices for encrypting their long-term archive files. You will need to research and identify the best and most secure cipher available today to recommend to Artemis Financial. Ultimately, you will recommend the algorithm cipher for file encryption that is most appropriate for their needs. Your recommendations should be documented and delivered to Artemis Financial. This work will inform your continued work with Artemis Financial in Project Two. However, the specifics of this assignment will not be required as a deliverable in Project Two. Address the following in your recommendations to Artemis Financial: Algorithm Cipher: Review the scenario and the Java Security Standard Algorithm Names, a standard list of algorithm ciphers provided by Oracle for recommending an appropriate encryption algorithm cipher. Specifically, recommend an…arrow_forwardPlease respond to the following question. Your response should be at least one paragraph long. What are the top vulnerabilities today in the industry and what do think is the most critical that you should work on?arrow_forward
- Does the breach of data have any effect on the security provided by the cloud? Do you have any inkling as to the possible types of defences that may be utilised?arrow_forwardThere is a possibility that you may get emails alleging that someone has stolen your identity or compromised the information associated with your account. Consider the repercussions of your actions.arrow_forwardYou are going to get an email from the mail server at work informing you that your password has been changed and that you need to confirm this information. There is a strong likelihood that you haven't changed the password in a while. What caused the password to be different? Malware that was installed on the computers that successfully changed the password may have been utilized by an attacker.arrow_forward
- Match the attack vector with the identified attack (see attched photo) You can only choose one attack for each and once used you cannot re-use the attack.arrow_forwardAssuming I have a very important not confidential message to send to a friend, whichis means that I do not care whether the massage is seen by others or not, my aim is to get it to my friend with its integrity ensured.Outline the mechanisms and procedures you would go through to deliver this message securely.arrow_forwardYou are going to get an email from the mail server at work informing you that your password has been changed and that you need to confirm this information. There is a strong likelihood that you haven't changed the password in a while. What caused the password to be different? Malware that was installed on the computers that successfully changed the password may have been utilized by an attacker.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education