Wk-5 D2

In this discussion, I am going to talk about the data breach on the Fetal Diagnostic Institute of the Pacific in Honolulu, HI. I have posted the link under References [1].
It was cyberattack that potentially breached close to 41,000 patients. Their PII was compromised. The hackers breached one of the institute servers, which included some patient records. The officials acted to contain the incident and contacted a cybersecurity firm. They were able to successfully remove the virus, clean the system and immediately contained the attack but they expected up to 41,000 patient information could have been compromised. The data of both past and current patients were impacted by the breach but the FDIP claimed they do not store the credit card details on their servers.
How could this have been avoided or control strategies to mitigate these:
The best ways to avoid any cyber-attack is by improving authentication and encryption.
Two Factor Authentication is one place to start with. 2FA expects whoever trying to access their data to confirm their identity in two different ways and this will be a problem for those who try to hack or use brute force kinds of attacks to hack into the system. There is always the extra safety that if a hacker could get one component right, he is probably going to get the next one wrong and so there will still be some level of trust. With this, you have a second layer of authentication and rather than entering just a username and password, you should validate yourself in 2 different ways. While this is only used in personal commodities like to access an electronic device or maybe to login to your bank account online, it might be too complicated for a health account but if we need to have security, its always best to use the safest way. This makes it harder for the attackers to access the online accounts because knowing the victim’s password alone is not enough to pass the authentication check. In single-factor authentication, user ID and password are not trustworthy. The major problem with password-based authentication is that not many people create and use diligent passwords and fail to change often even after reminders. Passwords are also prey to external threats, to brute force attacks, or even rainbow table attacks. Given time and resources, the password-based system can be easily hacked, and it’s being done easily in the modern-day world. All these can be avoided using 2FA. Different devices and services are used for implementing 2FA from tokens and RFID cards to smartphone apps. 2FA products can be divided into two categories: tokens which are provided to users to use to get into their account, and software that recognizes and authenticates users. This 2FA can also make use of an extra token/biometrics/voice recognition and any one of this can be used on top of the usual password to make it harder for it to be compromised. By having this 2FA, it wouldn’t have been easy for the attacker to get into the server and gain access to all this information.

Fetal Diagnostic Institute of the Pacific Experiences Ransomware Attack

Don't use plagiarized sources. Get Your Custom Essay on
Wk-5 D2
Just from $13/Page
Order Essay

I want 150 words explanation on above paragraph. you must include at least two citations and 2 references., your sentence must be start from, I like your post, I would like to add some more details on your discussion….

The selected article that outlines a recent security breach involves Credential Stuffing Attack Again that was experienced by Dunkin. The article has been retrieved from https://www.pymnts.com/news/security-and-risk/2019/dunkin-credential-stuffing-attack/.  By description, credential stuffing takes place when hackers employ combinations of usernames and passwords which are leaked from the other Websites and use them to get into other accounts at another website.  One control that would militate against credential stuffing is to use two-factor authentication (2FA). 2FA offers an additional layer of security and protection for the user accounts. With two-factor authentication (2FA), both username and password are needed for authentication and thus, entrenching the security model making it more complicated for the attacker to bypass or hack (Zhang et al., 2018). Since 2FA requires the second type of identification such as verification through SMS, which the hacker may not have, it reduces the chances that the hacker impersonates a user and gain access to the computers and reduces unauthorized access (Zhang et al., 2018).
Pymnts. (2019). Dunkin’ Falls Victim To Credential Stuffing Attack Again. Retrieved from https://www.pymnts.com/news/security-and-risk/2019/dunkin-credential-stuffing-attack/
I want 150 words explanation on above paragraph. you must include at least two citations and 2 references., your sentence must be start from, I like your post, I would like to add some more details on your discussion….

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 15% with the discount code SKYLINE