Question

In: Computer Science

Which cyber security measure would have been most likely to have prevented the 2016 successful attack...

Which cyber security measure would have been most likely to have prevented the 2016 successful attack on the Democratic National Committee (DNC): A. Stronger passwords used by DNC employees B. 2-factor authentication that uses a password and a security question for the user C. Hardware 2-factor authentication D. 2-factor authentication that uses a password and a text to the user's phone E. Software 2-factor authentication

Solutions

Expert Solution

Before discussing the measure that would have prevented the cyberattack on the Democratic National Committee in 2016 we must be aware of about this attack

Democratic National Committee(DNC) is a political party in the US and in 2016 few Russian Computers hacked the Computer networks of DNC and breached their data. This cyber-attack was done in order to get Donald Trump to win the election which was held in 2016 for the new president of America. Russian Government wanted to let Donald Trump win that's why the Russian government indulges its hackers to do this cyberattack on DNC. Later on when Barak Obama gave orders to get the details of this attack then it was clear that it was done by Russian computer attackers.

Democratic National Committee could have avoided such cyber-attacks if they would have taken certain steps in order to save their computer networks. Various steps can be taken in such a case but the most appropriate action that could have been taken is

A. Stronger passwords used by DNC employees

AND

E. Software 2-factor authentication

The reason behind this is:

1. If DNC employees would have used stronger passwords then it would not be easy for Russian computer hackers to hack such systems with stronger passwords and the DNC network would have saved.

2. DNS should have enabled 2-factor authentication in software so that no external or public email or webmails can easily and directly reach to DNC network because mails contain a major malicious code of hacking that causes data breach. Do if such emails are stopped before only with 2 step authentication in software so this breach could have been avoided

3. DNS employees can get good training on such attacks on their network so that they can avoid such attacks.

4. 2-factor authentication also checks the employee credentials of DNS so that even their own employees can also not harm their network and such cyber attacks could be avoided.


Related Solutions

Various dimensions have been used to define and measure quality. Which three would be most important...
Various dimensions have been used to define and measure quality. Which three would be most important from the patient’s perspective? Which three would be most important from the physician’s perspective? Why?
Sharpe’s and Treynor’s. Which measure are you most likely to use ? What benchmark would you...
Sharpe’s and Treynor’s. Which measure are you most likely to use ? What benchmark would you choose to compare the performance? The use of the Sharpe’s ratio has been more mainstream. Sortino’s is rarely mentioned in undergrad textbooks; however, it is used by practitioners. Sortino’s Ratio is only penalizing for harmful volatility. In your opinion, do you think it would be appropriate to utilize this ratio? Would you use it to evaluate ?
Saudi Aramco post cyber security attack. Make a plan that relates to statements of policy. Recommend...
Saudi Aramco post cyber security attack. Make a plan that relates to statements of policy. Recommend protocols and mitigating factors to the organization. Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Focus on disaster and incident response protocols as well as access control. Then assess the proposed method on maintaining the success of the plan going forward. Justify how your method will ensure the ongoing effectiveness of the information assurance plan.
Research the top five most prevalent forms of cyber-attack and provide an explanation for each. [100...
Research the top five most prevalent forms of cyber-attack and provide an explanation for each. [100 marks]
Which ONE of the following loans would most likely have the lowest initial interest rate?
Which ONE of the following loans would most likely have the lowest initial interest rate?a traditional adjustable-rate loan which allows the lender to change the interest rate at the end of every year,a 30-year fixed rate loana 3/27 hybrid adjustable-rate loan that locks the interest rate for the first 3 years and then allows the lender to change the interest rate at the end of every year for the next 27 years.a 10/20 hybrid adjustable-rate loan that locks the interest...
Compare and contrast theories of crime causation. Speculate as to which theory would have most likely...
Compare and contrast theories of crime causation. Speculate as to which theory would have most likely detected fraud at Enron. Assess the six situational categories that cause non-sharable problems. Determine which of these six categories, in your opinion, were prevalent at Enron.  
Physiology of Exercise 11. An elite powerlifter would most likely have a higher percentage of which...
Physiology of Exercise 11. An elite powerlifter would most likely have a higher percentage of which fiber type? 12. Explain blood glucose homeostasis during exercise. Talk about the hormone involved and the actions they take to control our blood glucose. 13. How do athlete's differ from the general population in hormone and receptor number. 14. What are some of the common fare markers (fats & triglycerides) that are seen in a blood test and what do they mean and how...
What would be a good Topic for a Dissertation in Cyber Security in 2020 Create a...
What would be a good Topic for a Dissertation in Cyber Security in 2020 Create a 750-word document that includes the following: An opening paragraph introducing the topic and the reasons why you chose the topic. A summary of each of the articles you used that provide support for further research on the topic you chose. Include in the summary information on why the article supports further research. Each summary should be approximately 100 words in length. A concluding paragraph...
1. Which of the following goods would be the most likely to be subject to a...
1. Which of the following goods would be the most likely to be subject to a government-imposed tax? A Cereal B Bottles of alcohol, such as whiskey and gin C Shoes 2. Which of the following is likely to have the largest elasticity of supply? A The producer of vanilla ice cream B The producer of yachts C A dentist 3. Assume that as your income increases, your consumption of burgers decreases. We can assume that your income elasticity of...
Define a weather related derivative security. Describe the type of company that would most likely use...
Define a weather related derivative security. Describe the type of company that would most likely use one of these securities. Select a company that would use a weather derivative and explain how it will benefit from it.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT