Question

In: Computer Science

Must post first. Write a short "newsletter" article (3 to 5 paragraphs) for the non-technical managers...

Must post first.

Write a short "newsletter" article (3 to 5 paragraphs) for the non-technical managers and employees at Sifers-Grayson to explain the following:

(a) What is Phishing? (Focus on phishing emails and targeted attacks that include spear phishing and whaling.)

(b) What "bad things" can happen when a successful phishing attack gives outsiders access to company networks and computers?

(c) How can employees avoid "biting" on a "phish?"

(d) How should employees report phishing attacks? Why is immediate reporting critical to stopping the attackers?

Since this article is for a newsletter, you may use an informal but professional tone (address the reader as "you," use "we" and "our" to refer to the organization's perspective). The focus of the article should be upon changing how people think about and respond to computer security incidents. Humor is good but should not lessen the severity of the problem.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article

Solutions

Expert Solution

Phishing is a type of cyber attack in which a fraud attempts to get the sensitive information of a person by the means of email or telephone or any other network means. The fraud projects him/her as a trusted entity and attempt to get some sensitive or personal information like username or password or bank related details of the victim. The phishing is mainly of two types spear phishing and whaling.Usually a phishing attack may be sent to many but in case of spear phishing the target is the individual and the hacker or the bad guy sends a personalized email or any other message to get the sensitive information.The hacker impersonates as a known person to the victim.The second type of phishing attack is called whaling which is a special case of spear phishing in which the target is sent a mail by the attacker by impersonating as a highly influential people like senior manager or VP or CEO. This is also a target phishing like spear phishing.

The list of 'bad things ' that can happen to an organization or company when the phishing attack provides an access to the network of the company is very long.The top of this list would be the overall loss to the company in its revenue. The loss can be different at different times.If the hacker gets access to the network it can bring down the servers or other network devices which can result into incurring loss to the organization due to the downtime faced. The phishing attack may also result into the loss of reputation in the market due to any unethical acts done by the attacker by impersonating any employee of the organization or the company.

The major things that needs to be taken care of to avoid biting on a 'phish' are :

  1. Check if the email or message is very tempting or lucrative in nature.
  2. Always check that the URL is https and not only http.
  3. The phishing attack normally ask the user or victim as an urgent task to be performed.
  4. Always be aware to open any hyperlinks and check them before opening in the browser.
  5. Always be aware to open any attachments and check them before opening in the computer/system.
  6. Check for the identity of the user who has sent the message.
  7. Always check before performing any action about the unknown sender .

The immediate action which should be performed when you find that you are a victim of the phishing attack can be changing your passwords and then checking the system for any misbehavior or any malicious file or virus present in the system. Immediately inform your higher-ups in the company or organization for this phishing attack.The phishing attack might result into an access in the  network of the company and thus it is important to immediately inform the network management team and other employee involved in the firewall and security of the company. If you find that the attacker has got your information by the phishing attack then you must do a security scan of your system at the earliest and activate two factor authentication for any data like credit card transaction or any other sensitive data which you think can be altered or can be harmful.


Related Solutions

Post: 3-4 paragraphs must have at least an in text citation and reference in APA formatting,...
Post: 3-4 paragraphs must have at least an in text citation and reference in APA formatting, Answer question with application of economic terms. QUESTION: Explain what would be the most effective type of policy for our economy right now(fiscal and monetary). Now, if the economy is in a recession, analyze the role of using fiscal and monetary policy to help stabilize the economy.
Discuss how managers build, reinforce, and change culture. Your post should be approximately 2 -3 paragraphs...
Discuss how managers build, reinforce, and change culture. Your post should be approximately 2 -3 paragraphs (100-150 words)
Write 3 short paragraphs of at least four sentences each on: What would an Utilitarian say...
Write 3 short paragraphs of at least four sentences each on: What would an Utilitarian say about spanking? Is it the greatest good for the greatest number? What would a Duty ethicist say about spanking? Consider Kant’s second formulation, that all human beings should be treated only as ends in themselves. Or, should this be determined by looking at nature or a religious text? What would a Virtue Ethicist say? Consider Aristotle’s Golden Mean. How does your spanking your children...
Write 3 paragraphs for reflection and should be do the following: 1. In first paragraph, Summarize...
Write 3 paragraphs for reflection and should be do the following: 1. In first paragraph, Summarize the article (attached below). (Don't plagiarism from article. Please use your own words to summarize article below) 2. In second paragraph, Connect the article with one of those "culture is an integrated system" or "cultural anthropology" or "how environment can shape cultural adaptations" or "Ethnography" or "Cultural universals". Be specific about the connections you make. 3. In third paragraph, Include your own reflection on...
Write 3 paragraphs for reflection and should be do the following: 1. In first paragraph, Summarize...
Write 3 paragraphs for reflection and should be do the following: 1. In first paragraph, Summarize the article (attached below). (Don't plagiarism from article. Please use your own words to summarize) 2. In second paragraph, Connect the article with one of those "Archaeological methods" or "Early farming and the rise of cities" or "Archaeological record – the material artifacts and environmental evidence". Be specific about the connections you make. 3. In third paragraph, Include your own reflection on what you’ve...
Write 3 paragraphs for reflection and should be do the following: 1. In first paragraph, Summarize...
Write 3 paragraphs for reflection and should be do the following: 1. In first paragraph, Summarize the article (attached below). 2. In second paragraph, Connect the article with one of those "The Fossil Record of Human Biological Evolution", "Habitual Bipedalism" or "Fossil Skeleton". Be specific about the connections you make. 3. In third paragraph, Include your own reflection on what you’ve read/learned. What do you think about it? Article Here: "Evidence Indicates Humans' Early Tree-dwelling Ancestors Were Also Bipedal" Experiments...
Could you please write 5 paragraphs on Pompeii. With the first paragraph being about the event...
Could you please write 5 paragraphs on Pompeii. With the first paragraph being about the event : what happened, when, where, and who. The other four give details and background information.
Please write a technical paper that defines 3 to 5 security features that can be integrated into the Quadrago game.
Please write a technical paper that defines 3 to 5 security features that can be integrated into the Quadrago game. Provide design diagrams or pseudocode defining how the security feature would be implemented, and document the test cases for each feature to demonstrate verification (function accuracy) and validation (operational use) testing.
ANSWER MUST BE IN TWO FULL PARAGRAPHS AND NOT COPIED FROM ANOTHER POST THAT HAS BEEN...
ANSWER MUST BE IN TWO FULL PARAGRAPHS AND NOT COPIED FROM ANOTHER POST THAT HAS BEEN ANSWERED Explain the difference between technical and fundamental analysis using specific examples. Which type of analysis would be better suited to your strengths and personality?
Internet Case 14.5 – Evaluating Liquidity and Profitability (MUST POST FIRST) Initial Post – As an...
Internet Case 14.5 – Evaluating Liquidity and Profitability (MUST POST FIRST) Initial Post – As an employee, write an internal memo to your manager addressing the following: Use the Internet search engine of your choice and do a general search on the name of a company of interest to you. Explore the web site of the company you choose and locate that company’s most recent financial statements. You may need to look under a category that provides general information about...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT