Skip to content

CS204 - Cyber Law

2 Topics 23 Posts
  • CS204 Assignment 2 Solution and Discussion

    Solved cs204 assignment 2 solution discussion spring 2020
    5
    0 Votes
    5 Posts
    1k Views
    zaasmiZ
    @zaasmi said in CS204 Assignment 2 Solution and Discussion: Suppose that if you’ve ever tried to login to your online bank account and find that not all of your savings are being accounted for, it could be an indication that you’ve been targeted by cyber criminal. Although there are several ways that cyber criminals could have gotten your account data, there’s a fair chance you’ve accidentally come across a phishing website in the past, misinterpreting the login page of your online bank. Enlist all possible security measures to protect your online banking account from cyber criminals. Respond as if the network has already been breached. Adopting this mindset forces the IT team to prioritize the most business-critical parts of the network and use network segmentation as a strategy. When done correctly, network segmentation, achieved through the creation of network zones, limits the ability for a hacker to move laterally across a compromised network. Network segmentation requires continual updates and configurations, but it can mean the difference between a hacker getting only as far as an employee’s infected computer and helping themselves to the bank’s ATM systems. Implement an enterprise-wide security policy. A well-defined security policy serves as a crucial road map for any bank IT team to maintain a truly adaptive security architecture. It’s what helps the people tasked with protecting the bank’s systems determine the best way for the network to operate with minimal risk. Additionally, the security policy should take into consideration all regulatory and enterprise compliance requirements and how to apply timely patches to maintain compliance. Security policy enforcement. It’s one thing to have a security policy that defines how the IT platform behaves and another to actually validate that it is being enforced across your network. Doing the former but not the latter might allow you to comply with some regulations, but it won’t make your network safer. Organizations must constantly monitor their network for changes to configurations and ensure that these changes are approved and compliant with policy. It’s a collaborative effort across the enterprise—network operations, security operations, and the CIO.
  • CS204 Assignment 1 Solution and Discussion

    Solved cs204 assignment 1 solution discussion spring 2020
    3
    0 Votes
    3 Posts
    2k Views
    zaasmiZ
    @moaaz said in CS204 Assignment 1 Solution and Discussion: Question. 2 Marks 10 Mr. “Omar” is an HR coordinator at XYZ University. He receives an E-mail containing a message that, “Your University’s E-mail account password will be expired within 24 hours” from some fake E-mail account pretending to be the legitimate E-mail from University. Mr. “Omar” is redirected to a fake password renewal page i.e.“xyzcuniversity.edurenewal.com” where both new and existing passwords are requested. The cyber attacker is monitoring the page and hacks the original password to gain access. Keeping in view the above scenario, answer the following questions: Mention the cyber-crime name, which is occurring in the scenario. Mention the category of cyber-crime. Mention all possible prevention measures for such type of cyber-crimes. Solution: Phishing Attack , Data theft or Email Spoofing Cyber-Crime against property Prevention Measures • Learn to Identify Suspected Phishing Emails • Check the Source of Information from Incoming Mail • Do not click on hyperlinks or links attached in the email, as it might direct you to a fraudulent website. • Type in the URL directly into your browser or use bookmarks / favorites if you want to go faster. • Enhance the Security of Your Computer • Update on your operating system and web browsers. • Enter Your Sensitive Data in Secure Websites Only • The best way to prevent phishing is to consistently reject any email or news that asks you to provide confidential data. • Delete these emails and ask your university to clarify any doubts. • Check Back Frequently to Read About the Evolution of Malware
Reputation Earning
How to Build a $1,000/Month World CUP LIVE Matches Live Cricket Streaming
Ads
File Sharing
Stats

0

Online

3.0k

Users

2.8k

Topics

8.5k

Posts
Popular Tags
Online User
| |