Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

Wk-5 D2

  

Question:1 

In this discussion, I am going to talk about the data breach on the Fetal Diagnostic Institute of the Pacific in Honolulu, HI. I have posted the link under References [1].

It was cyberattack that potentially breached close to 41,000 patients. Their PII was compromised. The hackers breached one of the institute servers, which included some patient records. The officials acted to contain the incident and contacted a cybersecurity firm. They were able to successfully remove the virus, clean the system and immediately contained the attack but they expected up to 41,000 patient information could have been compromised. The data of both past and current patients were impacted by the breach but the FDIP claimed they do not store the credit card details on their servers.

How could this have been avoided or control strategies to mitigate these:

The best ways to avoid any cyber-attack is by improving authentication and encryption.

Two Factor Authentication is one place to start with. 2FA expects whoever trying to access their data to confirm their identity in two different ways and this will be a problem for those who try to hack or use brute force kinds of attacks to hack into the system. There is always the extra safety that if a hacker could get one component right, he is probably going to get the next one wrong and so there will still be some level of trust. With this, you have a second layer of authentication and rather than entering just a username and password, you should validate yourself in 2 different ways. While this is only used in personal commodities like to access an electronic device or maybe to login to your bank account online, it might be too complicated for a health account but if we need to have security, its always best to use the safest way. This makes it harder for the attackers to access the online accounts because knowing the victim’s password alone is not enough to pass the authentication check. In single-factor authentication, user ID and password are not trustworthy. The major problem with password-based authentication is that not many people create and use diligent passwords and fail to change often even after reminders. Passwords are also prey to external threats, to brute force attacks, or even rainbow table attacks. Given time and resources, the password-based system can be easily hacked, and it’s being done easily in the modern-day world. All these can be avoided using 2FA. Different devices and services are used for implementing 2FA from tokens and RFID cards to smartphone apps. 2FA products can be divided into two categories: tokens which are provided to users to use to get into their account, and software that recognizes and authenticates users. This 2FA can also make use of an extra token/biometrics/voice recognition and any one of this can be used on top of the usual password to make it harder for it to be compromised. By having this 2FA, it wouldn’t have been easy for the attacker to get into the server and gain access to all this information.

References:

Fetal Diagnostic Institute of the Pacific Experiences Ransomware Attack

Answer: 

I want 150 words explanation on above paragraph. you must include at least two citations and 2 references., your sentence must be start from, I like your post, I would like to add some more details on your discussion….

Question:2 

The selected article that outlines a recent security breach involves Credential Stuffing Attack Again that was experienced by Dunkin. The article has been retrieved from https://www.pymnts.com/news/security-and-risk/2019/dunkin-credential-stuffing-attack/.  By description, credential stuffing takes place when hackers employ combinations of usernames and passwords which are leaked from the other Websites and use them to get into other accounts at another website.  One control that would militate against credential stuffing is to use two-factor authentication (2FA). 2FA offers an additional layer of security and protection for the user accounts. With two-factor authentication (2FA), both username and password are needed for authentication and thus, entrenching the security model making it more complicated for the attacker to bypass or hack (Zhang et al., 2018). Since 2FA requires the second type of identification such as verification through SMS, which the hacker may not have, it reduces the chances that the hacker impersonates a user and gain access to the computers and reduces unauthorized access (Zhang et al., 2018).

References

Pymnts. (2019). Dunkin’ Falls Victim To Credential Stuffing Attack Again. Retrieved from https://www.pymnts.com/news/security-and-risk/2019/dunkin-credential-stuffing-attack/

Answer: 

I want 150 words explanation on above paragraph. you must include at least two citations and 2 references., your sentence must be start from, I like your post, I would like to add some more details on your discussion….

WHAT OUR CURRENT CUSTOMERS SAY

  • Google
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!
Mindi D
Mindi D
Brilliant writers and awesome support team. You can tell by the depth of research and the quality of work delivered that the writers care deeply about delivering that perfect grade.
Samuel Y
Samuel Y
I really appreciate the work all your amazing writers do to ensure that my papers are always delivered on time and always of the highest quality. I was at a crossroads last semester and I almost dropped out of school because of the many issues that were bombarding but I am glad a friend referred me to you guys. You came up big for me and continue to do so. I just wish I knew about your services earlier.
Cindy L
Cindy L
You can't fault the paper quality and speed of delivery. I have been using these guys for the past 3 years and I not even once have they ever failed me. They deliver properly researched papers way ahead of time. Each time I think I have had the best their professional writers surprise me with even better quality work. Elite Academic Research is a true Gem among essay writing companies.
Got an A and plagiarism percent was less than 10%! Thanks!

ORDER NOW


Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant
BSN

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts

See Why Our Clients Hire Us Again And Again!


OVER

10.3k
Reviews

RATING
4.89/5
Average

YEARS
13
Mastery

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!

Reliable

Professional

Affordable

Quick

Using this writing service is legal and is not prohibited by any law, university or college policies. Services of Elite Academic Research are provided for research and study purposes only with the intent to help students improve their writing and academic experience. We do not condone or encourage cheating, academic dishonesty, or any form of plagiarism. Our original, plagiarism-free, zero-AI expert samples should only be used as references. It is your responsibility to cite any outside sources appropriately. This service will be useful for students looking for quick, reliable, and efficient online class-help on a variety of topics.