Weekly Writing Assignment, Week 13

For this week’s Weekly Writing Assignment, add a comment to this post in memo format that describes what you have contributed to your team’s collaborative project. Include any writing drafts and/or research that you have done. This is a way to maintain accountability for each team member’s contributions and to keep Prof. Ellis apprised of the work that your team members are doing to help bring the project together. Watch this week’s lecture for more details.

8 thoughts on “Weekly Writing Assignment, Week 13”

  1. To: Professor Ellis
    From: Muztahid Sakif
    Date: 12/5/2021
    Subject: Contribution

    My team and I team have selected the following topic: Increased Cyber Attack During the Pandemic. For this topic, we have created 6 subtopics. We have assigned 1 to each group member. My responsibility is researching the different types of cyber attacks.
    I have worked on a draft which I will include in this post:

    Draft:

    Distributed Denial of Service (DDoS) is a type of malicious attack where cyber criminals make a specific online service unavailable for a particular user by increasing the number of traffic. DDoS attacks can be carried out by IoT devices. IoT (internet of things) are devices such as fridge, home security system, microwave which are wifi enabled. Attackers infect the devices with malware which makes it easier for them to control these devices and send instructions to carry out the attack. DDoS attacks can be identified when a site suddenly becomes slow or unavailable. However, this might not always be accurate because a number of other causes can also cause problems within a site like increased traffic (increased users). For this reason, there usually needs to be a further investigation like using traffic analytics tools. DDoS is a very common type of cyber attack and during pandemic it increased significantly

  2. To: Professor Ellis
    From: Olamide Yomi
    Date: 12/5/2021
    Subject: My Contribution

    Together with my other teammates, we decided on the topic: Increased on cyber-attack during the pandemic, we decided the work-load into 6 parts with different individuals focusing on different parts. I have the liberty of taking part in the introduction.
    Giving a brief history about the topic and preparing our reading on what to expect from the research.

    Draft:
    Technology has been the most dominated thing in the world today since back in the age of the industrial revolution the introduction of new technologies has substantially improved in the life of people. The biggest of all being invention of the computer. Computers have come a long way from being the big boxes complex machines to a more user-friendly and non-complex device anyone used and taking anyone being the like of smartphone or the personal computer (PC). Along with the internet, computers have really made communication as easy as picking up a smartphone dialing a number to speak to someone in a very distant country. The internet which was made a virtual place of communication referred to as cyber-space connected using fiber optic cable to and from the internet. As the world’s population increases, so are the cyberspace of the internet expands as communication fed into it.
    As we have come to know the internet has gradually been used in all aspects of life. In a place such as banking, Hospitals, Emergency services, and Education place. These cause an increase in threats called cyber-attacks.

  3. To: Professor Ellis
    From: Ducquon Hinds
    Date: 12/5/2021
    Subject: Contribution

    My teammates and I decided on the topic “Increased Cyber Attacks During the Pandemic. We split the work into 6 different parts and everyone was responsible for a section. My draft is listed below:

    The increased Cyber Attacks during the pandemic
    The tremendous human tragedy of the COVID-19 epidemic has caused individuals across the world to use cutting-edge technology ranging from data science to artificial intelligence to communicate and engage with one another. The world became more digitally linked and vulnerable than it had ever been in only one month. Organizations began using the internet in March to ease remote communication between huge groups of home-based workplaces that previously required employees to convene in a common physical location. As a result of the epidemic, everyone is now working from home. All of this is due to data, computer systems, and their applications becoming connected. Nowadays, digital networks are employed in practically every aspect of human life. The widespread usage of virtual channels, on the other hand, has unwittingly contributed to an increase in cybercrime. Cybercriminals have become more active in today’s climate, preying on the personal data of both individuals and organizations. To avoid a repetition of the crisis, cybersecurity operations to protect digital networks and devices must be upgraded.
    The Cyber Threat Landscape
    The cyber threat landscape is diverse
    • Cybercriminals recognize that current data security measures are “not fit for purpose” or sufficiently robust to prevent them from making successful cyber-attacks.
    • Hacktivists’ (hackers fighting for social and political issues) activities are adding to the cybersecurity threats
    • Script kids (‘junior’ hackers with little technical abilities) are putting cyber-attack packages to the test on a range of enterprises to improve their skills.
    Because of the opportunities that have developed because of the COVID-19 epidemic, most of these dangers have increased.
    Human error is another source of concern. Human error was already a major source of ‘cyber risk’ prior to the epidemic, with employees accidentally or negligently allowing access to the wrong persons. Working from home, on the other hand, exacerbates the problem. While working from home, employees may be interrupted by family members or social visitors. As a result of these diversions, people may become riskier. IT systems must adapt to these changes in working habits, as well as the growth in human error.
    The changing nature of Cyberattack
    Many hackers appear to be stepping up their game, and to take advantage of the recent movement in corporate culture toward remote work, they have built new malware to target and enter networks.
    Prior to the epidemic, around 20% of cyber-attacks utilized malware or tactics that had never been seen before. During the epidemic, this percentage has grown to 35%. Some of the new assaults employ machine learning to adapt to their surroundings while remaining undetected. Phishing attempts, for example, are growing more complex and use many media such as SMS and voice (vishing). Furthermore, phishing operations utilize news regarding vaccination advances. The sophistication of ransomware assaults is also increasing. To induce victims to pay the ransom, hackers are combining data leaking operations with ransomware.
    How Companies and employees can increase Cybersecurity
    Employees who work from home on their own computers (or even those who use a company-owned device) should follow basic cyber hygiene guidelines. These are some of them:
    Antivirus protection: Antivirus and malware software licenses should be supplied to employees for usage on their own computers. While this does not give failsafe protection, it does stop a lot of low-level threats.
    Cybersecurity awareness: Employees should be educated on proper practices and processes for sending emails and other material to private email accounts and/or cloud storage.
    Use a VPN: Virtual private networks (VPNs) give an extra degree of security to internet use at home. They cannot be depended on to prevent cyberattacks on their own, but they can serve as an effective deterrent. Businesses can use a few simple cybersecurity tactics.
    Utilize new tools and technologies: Companies may use modern technology like host inspection to improve the security of remote working.
    Risk management: For better risk management, businesses can use governance, risk, and compliance (GRC) systems. GRC solutions provide you with a clear picture of your company’s risk exposure and help you connect the dots between different risk disciplines (e.g., cybersecurity, operational risks, and business continuity).

    Conclusion
    It is obvious that cybersecurity is a serious concern, particularly in these challenging moments. Due to the Covid-19 epidemic, many company owners, enterprises, and organizations have turned to digital solutions to protect their firms’ long-term viability. However, many firms overlook the hazards and consequences of cybersecurity assaults while using digital solutions. According to studies, most business owners only take action to combat cybersecurity assaults after being personally affected by them. While some organizations may be fortunate, in serious circumstances, the data that has been stolen can have a significant impact on the organization and its consumers, causing the firm to be unable to continue operations. To avoid occurrences like the one described above, we believe that preventative measures should be implemented from the front end to the back end of every process. Every firm should have its own security policy, acquire security equipment or software, hire security specialists such as ethical hackers to undertake penetration testing, and only enable administrators to edit and access sensitive data.

    References
    Detecting Cybercrime Activities. (n.d.). Cyber-Attacks Structure. https://www.webscan.eu/cyber-attacks-structure/
    Melnick, J. (2020). Top 10 Most Common Types of Cyber Attacks. [online]. Available at: https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/
    TCS Worldwide, “How COVID-19 is Dramatically Changing Cybersecurity.” 2020. https:// http://www.tcs.com/perspectives/articles/how-covid-19-is-dramatically-changing-cybersecurity
    https://healthitsecurity.com/news/the-10-biggest-healthcare-data-breaches-of-2019-so-far
    https:// http://www.tcs.com/perspectives/articles/how-covid-19-is-dramatically-changing-cybersecurity

  4. TO: Prof. Ellis
    FROM: Edwin Baez
    DATE: 12/06/2021
    SUBJECT: Contribution

    My contribution to the group so far was to write my portion of the 4,000 words on my described topic. My topic was to dive into the pandemic and its effect on the industry and how it has caused the chip/microchip shortage that we are experiencing. As of now i have a rough draft as i “finished” my part but i’m going to revise and polish it. After all my teammates have put in their parts we will collectively tweak our project so it all flows with eachother.

    Draft:
    In a time where the world was taken by surprise, and time seemed to stop and have all of us wondering what came after, a profound and seemingly lasting effect would be left on our world’s situations. Everyone’s lives were impacted physically, mentally and last but not least, financially. As we saw ourselves in the midst of a pandemic, everyone made sure to do the best they could to not contract the deadly virus. This caused a lockdown that sent a ripple effect throughout the world and it’s various industries. Our economic structure was being tested and some industries have not been able to fully recover just yet.
    A pivotal market that has yet to recover from the long lasting effects of the COVID-19 pandemic has been the Chip industry. Only a short while after the lockdown began, manufacturers had to halt the production and distribution of Chips/Microchips, meaning whatever stores had available was all that was left at the time. This affected major companies and their products, such as computer parts manufacturers and probably the one that took the biggest hit was automobile manufacturers.
    When the lockdown began and we were in the middle of the pandemic, we all had massive amounts of time on our hands. During this time was when I decided to fulfil my dream of building my own computer and I definitely was not the only one who had the same idea. Luckily I was able to purchase all my computer parts for their retail price since I did it very early, but I recognized a trend: not many parts up for sale, a lot of people looking to buy parts. Since manufacturers we’re not producing any new parts, the market became inflated and price for parts skyrocketed to prices that don’t match the value at all. The graphics card I had purchased for $300 is now worth close to $700 and that’s considering if you have the chance to find one. A computer that would have been built with $1,300 is now worth double the price due to the shortage in microchips used to build all the parts necessary.
    The main industry that has been threatened by the sudden chip shortage has been the AutoMobile Manufacturing industry. Like canaries in a coal mine, carmakers and suppliers in China are warning that a shortage of automotive microchips is threatening to slow down the global industry’s pandemic recovery.The alarm was sounded this month by Volkswagen and German suppliers Bosch and Continental, which cited tightening supplies of semiconductors and said bottlenecks could run into 2021. The industry is beginning to brace for impact as microchip prices rise and inventories dwindle [1]. This article states how the demand for these microchips is high but the halt to the manufacturing makes it difficult to acquire them so the prices are rising all while the supply vanishes. In a way it’s working backwards.
    Some countries are having different results with the same situation. For example, Japan and it’s very agile industry has been able to weather the storm so far. The Japanese industry’s long tradition of flexible manufacturing and transparent supply chain management has helped the companies pivot through the worldwide trouble. One of the head operators of Nissan in Japan states, “Almost every day, we reassess supply and allocation. It’s a balance of what kind of chips are available, what demand we face and in what markets. We are prioritizing chips for profitability, allocating them to the products that are most profitable.”[2]. The issue is still at hand, but the reason Japan is having a better outcome than the United States is because rather than halting the production of chips, they are instead allocating them to specific products. Instead of creating separate chips for each and every individual component, they focus on manufacturing for most profitable and more important products. Although Japan has been able to weather the storm so far, they can’t hold on forever as their outlook for the year 2022 is not looking very promising if they have to keep compromising how they have been so far.
    Now that we know what the issue at hand is, let’s dive into what is causing it to be a slow moving issue. As we were all being forced to work from home, everyone decided to invest in laptops and computers. Annual PC sales shot up 11% compared to 2019, making it the biggest growth year in a decade and putting strain on silicon chip manufacturers [3]. Not only is that a factor, but what we did with these computers plays a role. We mainly used them to work through zoom and video calls, realizing that not every computer/laptop is as fast as we want and what we want at the time is convenience and performance. While the pandemic changed our work habits and confined many of us to home, it also restricted chip makers from scaling up fast enough to satisfy the public’s hunger for more speed. Mandates on social distancing and indoor occupancy has meant manufacturers could not fully staff their operations for much of the past 18 months. You can’t play catch-up in a competition when you’re down half your team [3]. In essence, the issue has been the uproar in demand but the downfall in supply and the supply issue can’t be addressed as of yet due to the handicap that manufacturers are facing.

    References

    [1] “Now, chip shortage threatens industry; Growing auto output is taxing the supply.” Automotive News, vol. 95, no. 6964, 14 Dec. 2020, p. 0001. Gale Academic OneFile, link.gale.com/apps/doc/A645315690/AONE?u=cuny_nytc&sid=bookmark-AONE&xid=6294833b. Accessed 6 Dec. 2021.

    [2] “Chip shortage stings Japan’s agile industry.” Automotive News, vol. 95, no. 6992, 28 June 2021, p. 0003. Gale Academic OneFile, link.gale.com/apps/doc/A667059570/AONE?u=cuny_nytc&sid=bookmark-AONE&xid=e1719eef. Accessed 6 Dec. 2021.

    [3] S. Venkatesan, “Council Post: Why the global chip shortage is lasting so long and why it will have a positive end,” Forbes, 17-Nov-2021. [Online]. Available: https://www.forbes.com/sites/forbestechcouncil/2021/11/17/why-the-global-chip-shortage-is-lasting-so-long-and-why-it-will-have-a-positive-end/?sh=1bfab2ad153b. [Accessed: 07-Dec-2021].

  5. To: Prof. Ellis
    From: Mamadou Sakho
    Date: December 5, 2021
    Subject: Contribution

    The portion of my group’s work delegated to me is to talk about how to prevent cyber-attacks and why it is important to prevent them. Cyber-attacks are calculated attacks initiated by malicious hackers intended to do harm to peoples’ or companies or government computers or network systems. Along this process, several things happen such as theft of personal information, medical information, personal assets/financial, etc. These attacks are sometimes enabled by governments in order to attack another government or in reply to an attack. The result of these attacks can be devastated. For example, when a person’s valuable information is stolen, that person can be blackmailed. In order to get back the stolen information, the person has to pay the ransom, or his/her information is sold to the black market. It could be even worse when infrastructures such as hospitals or nuclear sites are targeted because it could result in a lot of lives being lost. For example, if a hospital’s power is turned off, people may die, and electrical materials may be destructed. For these reasons and other similar reasons, cyber-attacks are to be taken seriously and invested in fighting them. Anti-virus is good in fighting cyber-attacks but there are several steps to be taken prior such as having a qualified person to deal with upcoming threats in addition to having anti-virus software.

    Draft:
    Cyber-attacks are complex issues that the world is facing which require diverse measures to counter them. These measures involve a combination of political and technological responses. Since cyber-attacks are a global issue that every nation is facing, it requires a global solution. Therefore, the first measure to prevent cyber-attack is to develop a liaison between governments on the issue. This agreement needs to happen in all sectors private or public. The importance of sharing information across entities or governments is because cybercriminals have the tendency of working alone or in a small group which can be easier to identify. It is also significant in curving the threat of cyber-attacks through planning on how to deal with cyber threats. For example, the Budapest Convention on Cybercrime reaches an agreement on criminal activities in cyberspace. Another example within the United States’ response to prevent cyber-attacks is the creation of information sharing and analysis organizations, strengthening information and analysis centers, and managing the response to cyber-attacks under the Obama administration [6]. The vulnerability to cyber-attack varies across different organizations. Sectors such as banking, firms, aviation, and utilities are in direct line with attacks which means that they should be developing countermeasures like monitoring of accounts because the attack on one sector can easily spill over onto the other sectors. The second measure is to create a link or communication channel through which information can be shared rapidly in a simplified way which helps stop the spread of malware, speedily detects upcoming threats, and ease the attribution process [6]. Moreover, it is of utmost importance to have an equipped human capital that can develop, understand, and take appropriate measures to respond to upcoming threats. These are qualified personnel who will deal with the threat and contain it within the company to prevent any spillover to the other companies within the same environment. Indicators serve as early warnings which enables the human capital to respond quickly [6]. Between the government and organizations, the classification of documents delays the process of responding in a timely manner to the threat of cyber-attacks. Therefore, information needs to be declassified with assurances that no party could use it against the other as long as no crime is committed [6]. The goal of the above measures is to build a network that reacts in a unified way that minimizes threats and their impact within a whole sector not only one individual company.
    One of the first lines of defense as some of the cyber experts would call it is assessment. It is imperatively necessary to predict potential attacks and where they might come from in order to prevent them. However, this could be a challenge since hackers use proxy servers to hide their identities. Therefore, the option available is to trace the location where the attack originated from [7]. The above steps are necessary to protect your devices, network from cyber-attacks in addition to having strong anti-virus software installed in your devices. Anti-virus software protects your network by taking several measures. The software can prevent attacks. It automatically scans your devices, detects oncoming threats, and deletes any virus present in your device. Most of the anti-virus software runs automatically in the background which allows them to provide protection at all times. Any effective anti-virus software protects your files and hardware from malware like worms, Trojan horses, and spyware. It can also provide customizable firewalls and block suspicious websites. There is different anti-virus software available in the market such as Norton and AVG. For example, AVG was proven effective to block web-based threats and malware. It provides full protection against ransomware and phishing attacks and does wi-fi inspector. This anti-virus provides a file shield meaning that it automatically scans new files and put aside any suspicious file detected. Anti-virus software provides web protection that would block web-based threats and suspicious downloads. Also, your emails are protected from unsafe attachment which sometimes contains links that once you click on them, open a backdoor for attacks to take place [8]. Having the right defense mechanism in place to defend against these critical cyber-attacks is crucial. Cyber-attack can lead to access of personal information, medical information/status, financial/loss of money, damage on computer and network systems, and ransom payments. It would be devastating should critical infrastructures like hospitals, nuclear power sites be attacked. For example, if the power of a hospital is shut down or the temperature in a nuclear cooling tower is disturbed or attacking the features in electric cars while in motion [9]. All these underlined examples would have catastrophic outcomes. For these reasons and reasons alike, cyber-attacks are to be combatted.

    [6] Henry, S., & Brantly, A. F. (2018). Countering the Cyber Threat. The Cyber Defense Review, 3(1), 47–56. http://www.jstor.org/stable/26427375

    [7] David, M. W., & Sakurai, K. (2003). Combating Cyber Terrorism: Improving Analysis and Accountability. Journal of Information Warfare, 2(2), 15–26. https://www.jstor.org/stable/26502765
    [8] Paul, Ian. “Avg Antivirus for Mac: a Good Free Option.” Macworld – Digital Edition, vol. 37, no. 7, July 2020, pp. 25–28. Academic Search Complete, EBSCOhost, http://citytech.ezproxy.cuny.edu:2048/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=143690640&site=ehost-live&scope=site. Accessed 5 Dec. 2021.
    [9] Daş, Resul, and Muhammed Zekeriya Gündüz. “Analysis of Cyber-Attacks in IoT-Based Critical Infrastructures.” International Journal of Information Security Science, vol. 8, no. 4, Dec. 2019, pp. 122–133. Academic Search Complete, EBSCOhost, http://citytech.ezproxy.cuny.edu:2048/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=141353031&site=ehost-live&scope=site. Accessed 6 Dec. 2021.

  6. TO: Prof. Ellis
    FROM: Gani Graceni
    DATE: 12/07/2021
    SUBJECT: Contribution

    I have consumed some time researching and creating a rough draft to contribute on the 4,000 word team project. My team and I were able to break down the main topic of our project. Based on the number of the participants we decided to have 4 sub topics so each can choose one and elaborate based on reading and research. For our group the main topic is “IC Chip and Processors shortage”. I created a draft on the reasons why the chips are shorted and how the inactivity in the industrial sector creates delays and shortages to manufacturing processes. My draft will be revised and discussed with the team mates on the next virtual meeting that is taking place shortly. We will revise and then include a revised version of each sub topic draft into the main project. See below the sub section I have been working on.
    The Covid-19 pandemic and various infection control measures have made a great impact on the global integrated circuit companies causing the “IC chip shortage” [1]. The tech world is suffering a lack of its main components and it’s getting harder and harder to push them to the manufacturers that deliver to various costumers around the globe. Pandemic is a key reason why the chip shortage is happening but this research points out some other related reasons why chips are shorted. There are reasons like the demand for chips. The demand for chips has been significantly increasing. [2]. Covid-19 or not the manufacturers keep improving their product and that means more automation. The automated and latest device products need more IC chips and better performing processors. The high demand from various industries makes it harder for the IC chip industry to keep up with production especially at these pandemic times. Another main which is an effect of the Covid-19 pandemic is the inactivity of these IC chip production facilities [3]. This inactivity based on the lack of workers and supervisors of these facilities and equipment due to having been infected with the virus or by taking measures to not be present at the job. Even though the chip production is mostly automated the facilities still need the workforce to be present so the processes are completed. The completion of the production cannot happen without going through all the stages. There is more to the list which covers why there is a chip shortage such as the international control and cooperation. Being that the chip production and transport to manufacturers is a long industry chain the mother production companies should cooperate to strengthen and overcome this challenge. This will lead to solving the chip shortage issue earlier and taking the right measurements to prevent the lack of the chips in long term.
    The Covid-19 pandemic made it extremely hard for IC chip production. This was even a greater hit mentioning that the IC chip production and its workers are located mostly in Asia and that part was where the virus had its outburst and left many workers at home while the demand for the chips kept increasing on the other hand. When the pandemic spread all over the globe and these IC chip manufacturing companies stopped working people had started remote work, use of more PC’s and use of cars instead of mass transportation use of high speed data and communication that all work of Microprocessors and are depended on IC chips. The demand went as high as the prices went high and the production was far behind. The inactivity of the IC chips production came as a result of the pandemic and the lack of the chips became much of a problem as the demand for them increased. On the other hand there are more reasons why there is still a chip shortage. With the new technologies evolving and requiring more sensors and processors also the collaboration of the production facilities with similar facilities and organizations is required. So it is a lack of the production facilities asking for help and involving interacting with other similar companies or organizations. This actually becomes a cause if efforts are not taken [4]. If there are not international cooperation the chip shortage issue will still be a problem to now day’s technology. The chip industry mostly based in Asia should take efforts to strengthen international relations and improve their production performance by getting help on the research design and technical performance to prevent the risk of this global chip shortage issue

    Wu, Xiling, Caihua Zhang, and Wei Du. “An Analysis on the Crisis of ‘Chips Shortage’ in Automobile Industry ——Based on the Double Influence of COVID-19 and Trade Friction.” Journal of physics. Conference series 1971.1 (2021): 12100–. Web.

    “Asia Trade Brief: The Global Chip Shortage.” Country Report: Singapore (2021): n. pag. Print.

    Shen, Yuelin, and Sean P Willems. “Modeling Sourcing Strategies to Mitigate Part Obsolescence.” European journal of operational research 236.2 (2014): 522–533. Web.

    Karkaria, Urvaksh. “No Summer Break for the Chip Shortage; Factories Must Juggle Shutdowns, Supplies.” Automotive news 95.6991 (2021): n. pag. Print.

  7. To: Professor Ellis
    From: Olamide Yomi
    Date: 12/20/2021
    Subject: My Contribution

    Together with my other teammates, we decided on the topic: Increased on cyber-attack during the pandemic. The part that I did the specific attack during the pandemic.
    draft:
    The specific attack that happens during the covid-19 pandemic:
    During the covid-19 pandemic not only the virus attack that happen in global but also a lot of cyberattacks start to increase during the pandemic. Now in time that people, companies, businesses, shortage of material. Technology now in day needs to understand how to protect files, personal computer, prevent cyberattacks and malicious virus, malware, virus. In general, understand to protect your pc or computer with cybersecurity. During the pandemic, there how been also large amount phishing and ransomware. “As a result, so-called ransomware-as-a-service is on the rise. Prior to the pandemic, criminals were forced to invest time and resources into investigating targets.”3 paragraph line 4. But there are ways to protect yourself “There is no simple solution to cybercrime, but security experts recommend a few simple steps to help reduce the risk of a data breach.
    • Avoid reusing passwords. Instead, use a password manager to store long and unique passwords for each site.
    • Enable two-factor authentication on email, social networks, and work sites.
    • Enable a Virtual Private Network before you access sites that contain sensitive information.
    ”. paragraph 7 line 1. These are just some securities suggest taking and it better to change the password every 3 months recommend and strong.
    Another article that read about the covid pandemic is As Hackers Take Down Newfoundland’s Health Care System, Silence Descends it about there was a cyberattack on the how there was a cyberattack in that affect the health care worker from working. There was another attack on that happen, but the companies quickly recovered because they had a cybersecurity agency. Recovered the data and provide more service to investigating the attack to prevent it happen again created a strong security. “The cybersecurity agency confirmed that it is providing Newfoundland with digital forensics services, data recovery and general guidance.” Now in they that cybersecurity is important and should be on top to prevent any problems or issues while online or working on the internet. COVID-19 pandemic cybersecurity issues the article talk about the that happen during the pandemic how it affects in society and everyone else.
    “By moving to an online environment, organizations and companies worldwide have implemented the work-from-home (WFH) business model that increases attack vectors and risks to the internal data.”
    “ The healthcare sector has been one of the main targets of cyber-attacks during the pandemic.” The cyberattacks that happen during the pandemic is: Scams and Phishing, Malware, computer viruses, worms, a Trojan horse, spyware, and ransomware, Distributed Denial-of-Service (DDoS).
    “Ensure all devices firmware is up-to-date: Ensure that all devices and equipment firmware/OS are up-to-date and Ensure that up-to-date anti-malware software is activated in all network connected devices: Cyber criminals targeting vulnerable people by spreading various types of malware, multi-factor authentication, improving cybersecurity to prevent cyberattack.” Why remote working leaves us vulnerable to cyber-attacks it about
    “When you do that, it’s likely you don’t have any sort of two-factor authentication. This then makes it easier for attackers to exploit that data. If data is leaked, attackers compromise it, and it can end up in the wrong hands.”
    “That the most important thing is that companies urgently take steps to address threats if they haven’t already. He believes the current heightened risk of cyber-attacks is likely to become the new normal.”
    “ using a combination of capital and lower-case letters, numbers and symbols
    making it between eight and 12 characters long
    avoiding the use of personal data
    changing it regularly
    never using it for multiple accounts
    using two factor authentication”
    “Put up a firewall our employees have a responsibility to help keep your business secure. Make sure that they understand their role and any relevant policies and procedures and provide them with regular cyber security awareness and training.”

    Resources:
    [1] Austen, Ian. “As Hackers Take down Newfoundland’s Health Care System, Silence Descends.” The New York Times, The New York Times, 13 Nov. 2021, https://www.nytimes.com/2021/11/12/world/canada/newfoundland-cyberattack.html.
    [2] Dan, Dan. “Cybercrime Is Thriving during the Pandemic, Driven by Surge in Phishing and Ransomware.” CBS News, CBS Interactive, 19 May 2021
    https://www.cbsnews.com/news/ransomware-phishing-cybercrime-pandemic/.
    [3] Pranggono, Bernardi, and Abdullahi Arabo. “Covid‐19 Pandemic Cybersecurity Issues.” Wiley Online Library, John Wiley & Sons, Ltd, 14 Oct. 2020, https://onlinelibrary.wiley.com/doi/full/10.1002/itl2.247.
    [4] Jr, Bernd Debusmann. “Why Remote Working Leaves US Vulnerable to Cyber-Attacks.” BBC News, BBC, 25 July 2021, https://www.bbc.com/news/business-57847652.
    [5] “Protect Your Business Online.” Common Cyber Security Measures, https://www.nibusinessinfo.co.uk/content/common-cyber-security-measures.

    1. To: Professor Ellis
      From: Rosario Garcia
      Date: 12/20/2021
      Subject: My Contribution

      Together with my other teammates, we decided on the topic: Increased on cyber-attack during the pandemic. The part that I did the specific attack during the pandemic.
      draft:
      The specific attack that happens during the covid-19 pandemic:
      During the covid-19 pandemic not only the virus attack that happen in global but also a lot of cyberattacks start to increase during the pandemic. Now in time that people, companies, businesses, shortage of material. Technology now in day needs to understand how to protect files, personal computer, prevent cyberattacks and malicious virus, malware, virus. In general, understand to protect your pc or computer with cybersecurity. During the pandemic, there how been also large amount phishing and ransomware. “As a result, so-called ransomware-as-a-service is on the rise. Prior to the pandemic, criminals were forced to invest time and resources into investigating targets.”3 paragraph line 4. But there are ways to protect yourself “There is no simple solution to cybercrime, but security experts recommend a few simple steps to help reduce the risk of a data breach.
      • Avoid reusing passwords. Instead, use a password manager to store long and unique passwords for each site.
      • Enable two-factor authentication on email, social networks, and work sites.
      • Enable a Virtual Private Network before you access sites that contain sensitive information.
      ”. paragraph 7 line 1. These are just some securities suggest taking and it better to change the password every 3 months recommend and strong.
      Another article that read about the covid pandemic is As Hackers Take Down Newfoundland’s Health Care System, Silence Descends it about there was a cyberattack on the how there was a cyberattack in that affect the health care worker from working. There was another attack on that happen, but the companies quickly recovered because they had a cybersecurity agency. Recovered the data and provide more service to investigating the attack to prevent it happen again created a strong security. “The cybersecurity agency confirmed that it is providing Newfoundland with digital forensics services, data recovery and general guidance.” Now in they that cybersecurity is important and should be on top to prevent any problems or issues while online or working on the internet. COVID-19 pandemic cybersecurity issues the article talk about the that happen during the pandemic how it affects in society and everyone else.
      “By moving to an online environment, organizations and companies worldwide have implemented the work-from-home (WFH) business model that increases attack vectors and risks to the internal data.”
      “ The healthcare sector has been one of the main targets of cyber-attacks during the pandemic.” The cyberattacks that happen during the pandemic is: Scams and Phishing, Malware, computer viruses, worms, a Trojan horse, spyware, and ransomware, Distributed Denial-of-Service (DDoS).
      “Ensure all devices firmware is up-to-date: Ensure that all devices and equipment firmware/OS are up-to-date and Ensure that up-to-date anti-malware software is activated in all network connected devices: Cyber criminals targeting vulnerable people by spreading various types of malware, multi-factor authentication, improving cybersecurity to prevent cyberattack.” Why remote working leaves us vulnerable to cyber-attacks it about
      “When you do that, it’s likely you don’t have any sort of two-factor authentication. This then makes it easier for attackers to exploit that data. If data is leaked, attackers compromise it, and it can end up in the wrong hands.”
      “That the most important thing is that companies urgently take steps to address threats if they haven’t already. He believes the current heightened risk of cyber-attacks is likely to become the new normal.”
      “ using a combination of capital and lower-case letters, numbers and symbols
      making it between eight and 12 characters long
      avoiding the use of personal data
      changing it regularly
      never using it for multiple accounts
      using two factor authentication”
      “Put up a firewall our employees have a responsibility to help keep your business secure. Make sure that they understand their role and any relevant policies and procedures and provide them with regular cyber security awareness and training.”

      Resources:
      [1] Austen, Ian. “As Hackers Take down Newfoundland’s Health Care System, Silence Descends.” The New York Times, The New York Times, 13 Nov. 2021, https://www.nytimes.com/2021/11/12/world/canada/newfoundland-cyberattack.html.
      [2] Dan, Dan. “Cybercrime Is Thriving during the Pandemic, Driven by Surge in Phishing and Ransomware.” CBS News, CBS Interactive, 19 May 2021
      https://www.cbsnews.com/news/ransomware-phishing-cybercrime-pandemic/.
      [3] Pranggono, Bernardi, and Abdullahi Arabo. “Covid‐19 Pandemic Cybersecurity Issues.” Wiley Online Library, John Wiley & Sons, Ltd, 14 Oct. 2020, https://onlinelibrary.wiley.com/doi/full/10.1002/itl2.247.
      [4] Jr, Bernd Debusmann. “Why Remote Working Leaves US Vulnerable to Cyber-Attacks.” BBC News, BBC, 25 July 2021, https://www.bbc.com/news/business-57847652.
      [5] “Protect Your Business Online.” Common Cyber Security Measures, https://www.nibusinessinfo.co.uk/content/common-cyber-security-measures.

Leave a Reply