Cyber Attacks
Cyber Attacks
Explain the various different types of cyber attacks and challenges in E- governance
with relevant examples
1. Ransomware: -
Ransomware is a kind of malicious software that restricts access to a victim's data, files,
devices, or systems by encrypting them. This encryption makes the data useless until the
attacker is paid a ransom.1
Early versions of ransomware used encryption as the only method to hinder victims from
accessing their data and computers. Victims that kept regular backups were able to recover
their data, so eliminating the need to paying a ransom. Subsequently, malevolent individuals
started integrating cyber extortion strategies, using supplementary intimidations to coerce
victims into making ransom payments. In addition, assailants have begun to focus more on
victims' backup systems in order to hinder enterprises from recovering their data. The "2023
Ransomware Trends Report" from Veeam revealed that over 93% of ransomware assaults in
the previous year were particularly aimed at compromising backup data.2
Malware refers to any harmful program that allows unauthorized access to a user's systems.
Ransomware is a kind of software that requires payment in order to unlock and decrypt data,
allowing the victim to recover access.
Ransomware has the potential to do severe damage to people, companies, and even whole
communities or nations. Due to their ongoing success, these financially driven assaults are
becoming more prevalent. According to Verizon's "2023 Data Breach Investigations Report,"
ransomware was a factor in 24% of all breaches. Additionally, Sophos' "The State of
Ransomware 2023" revealed that 66% of companies encountered a ransomware assault in the
previous year, and out of those attacks, 76% led to data encryption.3
The emergence of the contemporary ransomware phenomenon may be traced back to the
WannaCry epidemic in 2017. This extensive and widely-publicized assault showcased the
1
Jnguyen, Ransomware attack - what is it and how does it work? Check Point Software (2024),
https://www.checkpoint.com/cyber-hub/threat-prevention/ransomware/ (last visited Sep 8, 2024).
2
Sharon Shea & Alissa Irei, What is ransomware? how it works and how to remove it Security (2023),
https://www.techtarget.com/searchsecurity/definition/ransomware#:~:text=Ransomware%20is%20a%20type
%20of,accessing%20their%20files%20and%20systems. (last visited Sep 8, 2024). What Is Ransomware? -
Definition, Prevention & More | Proofpoint US, https://www.proofpoint.com/us/threat-reference/ransomware
(last visited Sep 8, 2024).
3
What is Ransomware | Attack Types, Protection & Removal | Imperva,
https://www.imperva.com/learn/application-security/ransomware/ (last visited Sep 8, 2024).
feasibility and potential profitability of ransomware assaults. Subsequently, other iterations of
ransomware have been created and used in various forms of assaults.
The current increase of ransomware may be attributed to the COVID-19 outbreak. As firms
swiftly transitioned to remote work, vulnerabilities emerged in their cyber security measures.
These vulnerabilities have been used by cybercriminals to distribute ransomware, leading to a
significant increase in ransomware assaults.
Amidst the prevalence of digital threats, an astonishing 71% of firms have experienced
ransomware attacks, leading to an average financial detriment of $4.35 million each
occurrence.4
In 2023, a significant number of enterprises worldwide, around 10%, have been the victims
of attempted ransomware attacks. This is a significant increase compared to the 7% of firms
encountering comparable dangers in the previous year, indicating the highest rate seen in
recent years.5
The development of ransomware has seen substantial advancements in recent years. Several
significant categories of ransomware and associated risks encompass:
Double extortion ransomware, such as Maze, combines the encryption of data with
the theft of data. This strategy was created as a reaction to corporations who refused
to pay ransoms and instead opted to restore from backups. Cybercriminals may
manipulate an organization's data and use it as leverage to extort money by
threatening to expose it.
Triple Extortion ransomware adds an additional method of extortion to the existing
double extortion methodology. Frequently, this entails extorting a ransom from the
victim's clientele or associates, or executing a distributed denial-of-service (DDoS)
assault on the organization.6
Locker Ransomware refers to a kind of ransomware that does not encrypt the data
stored on the victim's computer. Instead, it immobilizes the computer, making it
impossible for the victim to use, until the ransom has been paid.
4
What Is Ransomware? Attack Types, Examples, Detection, and Prevention,
https://perception-point.io/guides/ransomware/what-is-ransomware-attack-types-examples-detection-and-
prevention/ (last visited Sep 8, 2024).
5
Ransomware Attacks and Types | How do Locky, Petya and other ransomware differ?,
https://www.kaspersky.com/resource-center/threats/ransomware-attacks-and-types (last visited Sep 8, 2024).
6
17 Ransomware Examples & How They Occurred | UpGuard, https://www.upguard.com/blog/ransomware-
examples (last visited Sep 8, 2024).
Crypto ransomware, often known as ransomware, highlights the prevalent use of
cryptocurrencies as the preferred method of payment for ransom demands. This is
because cryptocurrencies are digital currencies that are inherently more difficult to
trace due to their decentralized nature, which means they are not governed by the
conventional financial system.7
Wiper: Wipers are a kind of malicious software that is connected to, but separate
from, ransomware. Although they may use similar encryption methods, the objective
is to irrevocably prevent access to the encrypted contents, maybe by erasing the only
copy of the encryption key.
Ransomware as a Service (RaaS) is a method of distributing malware where
ransomware groups provide "affiliates" the opportunity to use their virus. These
affiliates deliberately introduce malware onto targets' systems and share any ransom
payments with the producers of the ransomware.8
Data-stealing ransomware refers to a kind of ransomware that specifically targets data
theft, rather than only focusing on encrypting data. One factor contributing to this is
that encryption may be a time-consuming process and can be readily detected,
allowing an organization to identify and stop the infection, therefore safeguarding
some data from becoming encrypted.
2. Insider attack: -
Cyber assaults refer to deliberate actions against computer networks and systems, particularly
those connected to the internet, executed by skilled cyber-hackers. The primary catalyst
behind the escalating cyber crimes is the increasing reliance on the internet. In recent years,
the use of computer networks via the internet has seen a significant surge. 9 Cyber thieves
have capitalized on the growing demand for internet-related services to manipulate the
privacy of individuals and organizations that rely on computer networks to keep their
confidential information, benefiting from the convenience and other perks of internet use. 10
7
16 Ransomware Examples From Recent Attacks - CrowdStrike,
https://www.crowdstrike.com/cybersecurity-101/ransomware/ransomware-examples/ (last visited Sep 8,
2024).
8
Id.
9
What Is an Insider Threat | Malicious Insider Attack Examples | Imperva, LEARNING CENTER,
https://www.imperva.com/learn/application-security/insider-threats/ (last visited Sep 8, 2024).
10
What is an Insider Threat? Definition, Types, & Examples | OpenText, https://www.opentext.com/what-
is/insider-threat (last visited Sep 9, 2024).
While there are several approaches available for secure communication, both symmetric and
asymmetric key-based, it is important to consider the potential risk posed by an individual
with privileged access to saved user credentials. Even in such situation, our system must be
resilient to such occurrences. Security breaches increase the likelihood of vulnerabilities
being exploited by attackers. Cyber thieves use vulnerabilities in security systems to gain
unauthorized access to computer systems and carry out their malevolent objective of stealing
sensitive user information. Unauthorized access to sensitive information is a severe criminal
offense that is strictly prohibited by law. Cyber crimes are considered very perilous and need
proactive measures to prevent their occurrence in any form. Proper understanding of cyber
assaults and knowledge of various cyber security strategies may effectively avoid cyber
attacks.11
An insider attack refers to a kind of attack when someone with authorized access to
information intentionally inflict harm or compromise security.
The individuals with access to the secret information may consist of current or former
workers, business partners, contractors, or security administrators.
Insider Attacks are perpetrated by those who possess intimate knowledge of the
computer network system and possess authorized access to all the information.
This kind of cyber assault poses a significant threat due to the involvement of inside
staff, which greatly increases the vulnerability of the whole system.
Computer organizations primarily prioritize safeguarding against external cyber
assaults, sometimes overlooking the potential risks posed by internal cyber attacks.
An insider threat refers to a security vulnerability that arises from inside the company
being attacked. It often entails a present or past employee or business partner who has
access to sensitive information or privileged accounts inside an organization's
network, and who abuses this access.12
Conventional security procedures often prioritize external risks and may not always be
effective in detecting internal threats originating from inside the company.13
11
Id.
12
What Is an Insider Threat? Definition, Types, and Prevention | Fortinet,
https://www.fortinet.com/resources/cyberglossary/insider-threats (last visited Sep 9, 2024).
13
What are Insider Threats? | IBM, https://www.ibm.com/topics/insider-threats (last visited Sep 9, 2024).
Examples of insider dangers encompass:
A careless insider is an unwitting individual who inadvertently exposes the system to external
risks. The most prevalent kind of insider threat arises from errors, such as inadvertently
leaving a device vulnerable or succumbing to a fraudulent scheme. As an example, a well-
meaning employee may inadvertently click on an unsecured hyperlink, so introducing
malicious software onto the system.14
A mole refers to an individual who, while being an outsider, has successfully obtained insider
privileges inside a privileged network. This refers to an individual who is not part of the
business but pretends to be an employee or partner.15
Unusual behavior seen inside the network may suggest the presence of an internal security
risk. Similarly, if an employee displays signs of discontent or harbors resentment, or if an
employee begins to assume more responsibilities with an excessive level of excitement, this
may suggest the presence of unethical behavior. Observable signs of insider threats that may
be monitored and traced include:
Safeguard vital resources, which may include tangible or intangible assets like as
infrastructure, technology, premises, and personnel. Intellectual property, such as customer
data for suppliers, proprietary software, drawings, and internal production methods, are also
14
What Is an Insider Threat? Definition, Types, and Prevention | Fortinet, supra note 12.
15
Insider Attack - an overview | ScienceDirect Topics, https://www.sciencedirect.com/topics/computer-
science/insider-attack (last visited Sep 9, 2024).
crucial assets. Develop a thorough comprehension of your essential resources. Pose inquiries
such as: What are the essential assets that we now possess? Is it possible for us to give
priority to our assets? What is our comprehension of the present condition of each asset?
Enhance visibility by using technologies that monitor staff activities and analyze data from
various sources. For instance, deception technology may be used to entice a malevolent
insider or impostor, so allowing for enhanced monitoring and understanding of their
activities.
Facilitate cultural shifts—ensuring security entails not just acquiring knowledge and skills,
but also fostering the appropriate mindsets and convictions. In order to mitigate carelessness
and tackle the root causes of hostile conduct, it is advisable to provide comprehensive
education to your staff on security matters and strive to enhance employee happiness.
Identifying and preventing insider threats might be more challenging compared to external
assaults. Traditional security measures like as firewalls and intrusion detection systems,
which primarily target external threats, are unable to detect these inside dangers. If an
attacker successfully exploits a legitimate login, the existing security measures may fail to
detect the anomalous activity. In addition, individuals with malevolent intent may more
effectively evade detection if they possess knowledge of an organization's security protocols.
Machine Learning (ML) software may be used to examine the data stream and determine the
most significant warnings. Utilizing digital forensics and analytics techniques such as User
and Event Behavior Analytics (UEBA) may aid in the identification, examination, and
notification of the security team on any insider threats. User behavior analytics may set a
standard for typical data access activities, while database activity monitoring can aid in
detecting policy breaches.
Denial of Service (DoS) attacks take advantage of the constraints imposed on a system's
resources, such as its bandwidth, processing capacity, or memory, therefore making it
inaccessible to authorized users. Attackers often use many methods to do this, such as
transmitting incorrect packets, exploiting software flaws, or using botnets to intensify the
attack.16
Denial of Service (DoS) assaults often focus on the web servers of prominent entities, such as
banking, commerce, and media corporations, as well as government and trade organizations.
While they may not usually lead to the theft or loss of valuable information or assets, they
may nonetheless impose considerable financial and temporal burdens on the victim.
Denial of Service (DoS) attacks manifest in several ways, with each method targeting distinct
weaknesses. An example of a typical sort of assault is the volumetric attack, when the target
is overwhelmed with an overwhelming amount of traffic. A different category, known as a
protocol attack, takes use of vulnerabilities in network protocols. Application layer attacks
inundate targeted programs by imitating authentic user actions.17
16
What Is a Denial of Service (DoS) Attack?, PALO ALTO NETWORKS,
https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos (last visited Sep 9,
2024).
17
Denial-of-Service (DoS) Attack: Examples and Common Targets, INVESTOPEDIA,
https://www.investopedia.com/terms/d/denial-service-attack-dos.asp (last visited Sep 9, 2024).
18
Denial of Service and Prevention - GeeksforGeeks, https://www.geeksforgeeks.org/deniel-service-
prevention/ (last visited Sep 9, 2024).
A denial-of-service (DoS) assault refers to a deliberate cyberattack aimed at disrupting the
availability of devices, information systems, or network resources, hence preventing
authorized users from accessing the intended services and resources.19
This is often achieved by inundating the intended host or network with an excessive amount
of traffic, causing the target to become unresponsive or crash. Denial of Service (DoS)
assaults may persist for varying durations, ranging from a few hours to many months. These
attacks impose significant costs on organizations and customers, as they result in
unavailability of resources and services, leading to loss of time and financial resources. 20
The prevalence of DoS attacks is increasing due to the growing reliance of companies and
customers on digital channels for communication and transactions.
Cyberattacks are often initiated with the intention of pilfering personally identifiable
information (PII), resulting in significant financial and reputational harm to enterprises. Data
breaches have the potential to focus on either a single organization or many companies
simultaneously. For instance, a corporation that has implemented robust security processes
may still be vulnerable to an attack if one of its supply chain partners lacks sufficient security
protections. When a group of firms has been chosen as targets, the attackers might use a
Denial of Service (DoS) strategy.
In February 2020, Amazon Web Services (AWS), a widely used cloud computing provider,
had a DDoS Attack. This attack affected over a million organizations, people, and
government institutions.
In October 2016, Dyn, a domain name system (DNS) provider, experienced a DDoS assault.
Dyn is responsible for hosting and managing the domain names of certain firms listed in this
directory on its server. When Dyn's server was breached, it had a direct impact on the
19
What is a denial-of-service (DoS) attack? | Cloudflare,
https://www.cloudflare.com/en-in/learning/ddos/glossary/denial-of-service/ (last visited Sep 9, 2024).
20
What is a distributed denial-of-service (DDoS) attack? | Cloudflare,
https://www.cloudflare.com/en-in/learning/ddos/what-is-a-ddos-attack/ (last visited Sep 9, 2024).
websites of the firms it provides hosting services for. The assault on Dyn inundated its servers
with an excessive amount of network traffic, resulting in a substantial disruption of online
services and the complete shutdown of more than 80 websites, including prominent platforms
such as Twitter (now known as X), Amazon, Spotify, Airbnb, PayPal, and Netflix.21
There was evidence of traffic originating from a botnet that was formed using a harmful
program called Mirai. This botnet seemed to have impacted over 500,000 internet-connected
devices. Unlike conventional botnets that target personal computers, this botnet specifically
targeted Internet of Things (IoT) devices that are readily accessible, such as internet-
connected cameras and recording devices. Subsequently, these inadequately protected devices
were used to carry out a Distributed Denial of Service (DDoS) assault with the intention of
incapacitating the gaming platform of the Sony Playstation Network. This was achieved by
overwhelming Dyn's server with an overwhelming volume of requests.22
During the early 2000s, Yahoo!, a prominent internet site, was the victim of the first
significant Denial of Service (DoS) assault, which resulted in its services being unavailable
for around one hour. This event emphasized the susceptibility of even the most resilient
systems.
The Mirai botnet launched a distributed denial-of-service (DDoS) assault in 2016, taking use
of Internet of Things (IoT) devices. This attack severely impacted prominent websites such as
Twitter and Netflix by overwhelming the DNS provider Dyn with an excessive amount of
data. This assault highlighted the increasing danger presented by the widespread use of
interconnected gadgets.23
In 2018, GitHub had a significant event when they were targeted by a massive 1.35 Tbps
assault. This attack used Memcached servers to magnify the amount of traffic sent towards
GitHub. These historical incidents exemplify the changing strategies and growing magnitude
of DDoS assaults.
21
Denial of Service attacks and its Types | Ethical Hacking,
https://www.greycampus.com/opencampus/ethical-hacking/denial-of-service-attacks-and-its-types (last
visited Sep 9, 2024).
22
Denial-of-Service Attack Types, Examples & Targets - Lesson | Study.com,
https://study.com/academy/lesson/what-is-a-denial-of-service-dos-attack-definition-types-examples.html
(last visited Sep 9, 2024).
23
Id.
Every occurrence led to the development of more effective defensive strategies, such as
enhanced traffic filtering and the use of advanced intrusion detection systems. Gaining a
comprehensive understanding of these critical periods offers essential knowledge on the
persistent and adaptable characteristics of Denial-of-Service (DoS) attacks. This highlights
the need of continuously innovating cybersecurity defenses.
4. Data leaks: -
A data breach, often known as a data leak, refers to the unauthorized disclosure of sensitive,
confidential, or protected material to an untrusted or insecure environment. Data breaches
may arise from several sources, including malicious hacking attempts, insider involvement
from current or former employees, or accidental data loss or disclosure.
Data breaches may include the illicit copying or transfer of data, known as exfiltration,
without impacting the original data source. In some instances, breaches result in the total loss
of data, such as in ransomware attacks, when hackers encrypt the data to prevent the data
owner from accessing it.24
Put simply, a data breach occurs when hackers or employees intentionally disclose or expose
confidential information. Consequently, the data might be destroyed or used by criminals for
nefarious intentions.
It is crucial to differentiate between a data leak and a data breach. These phrases are often
used interchangeably, yet they possess one significant distinction.
Data leaks and data breaches both entail the unlawful disclosure of data, but the distinction
between them lies in the source of the exposure.
Occasionally, the distinction between a leak and a breach becomes indistinct when thieves
use information obtained from a data leak to carry out a significant data breach. Consider, for
instance, a situation where a password for an email account has been exposed or made
24
What Is a Data Leak? Causes & Prevention | Abnormal, https://abnormalsecurity.com/glossary/data-
leak (last visited Sep 9, 2024).
accessible to unauthorized individuals. Once an email account is hijacked, a someone with
malicious intent might use it to carry out fraudulent activities such as invoicing fraud or
ransomware assaults.
A single data leak is sufficient for criminals to transform it into a substantial data breach.
Leaks pose an equally significant risk to companies as data breaches. Hence, it is essential for
enterprises to comprehend the underlying factors that lead to data breaches and adopt
effective measures to avert them.
Data leaks arise due to internal vulnerabilities. Cyberattacks are not often the cause of these
incidents. This is promising information for enterprises as it allows them to actively identify
and resolve data breaches before they are detected by thieves.
Social engineering schemes include the use of identical techniques used in cyberattacks to
orchestrate data breaches. Subsequently, the perpetrator will capitalize on the data breach to
initiate other cyber assaults. Phishing emails, for instance, have the potential to effectively
acquire an individual's login credentials, leading to a more significant data breach.
Inadequate password policies: Individuals often use the same password for many accounts
due to the convenience of memorization. However, in the event of a credential stuffing attack,
several accounts might potentially be compromised. Even a seemingly mundane practice such
as storing login information in a physical notepad has the potential to result in a data breach.
Software vulnerabilities have the potential to quickly escalate into significant cybersecurity
concerns for enterprises. Criminals might use obsolete software or zero-day vulnerabilities to
create various security concerns.
25
What is a Data Breach? | IBM, https://www.ibm.com/topics/data-breach (last visited Sep 9, 2024).
Outdated data: As firms expand and see turnover in their workforce, they may lose sight of
their data. System upgrades and infrastructure modifications may inadvertently reveal
outdated data.
Outdated data storage procedures provide an optimal environment for a data breach. This
might exacerbate the situation inside an organization when there is a high turnover of
information security employees. The absence of expertise in outdated data systems might
result in risks and incidents.
Cybersecurity systems must guarantee the prevention of data leakage. Malefactors may
readily use data breaches to commit further offenses.
Access controls are used to restrict access to sensitive data and systems exclusively to
authorized persons. Implement a role-based access control (RBAC) system, in which users
are given access privileges based on their assigned role. Implement multi-factor
authentication (MFA) to enhance security by adding an additional layer of protection.
Consistently assess and revise access privileges to deter unlawful entry. Implement the
principle of least privilege, wherein users are granted just the essential level of access
required to carry out their assigned jobs. This minimizes the potential areas vulnerable to
attack and hinders the ability for unauthorized access to spread inside the system in the event
of a security breach.26
Regular updates and patches address identified vulnerabilities, therefore thwarting potential
exploitation by malicious actors. Establish a patch management procedure to guarantee
prompt installation of updates. Utilize automated patch management technologies to optimize
and simplify the process. Give priority to important updates and fixes for systems that have a
high risk of vulnerability. Consistently assess and upgrade software and hardware to avoid
26
What is a Data Breach | Tips for Data Leak Prevention | Imperva, https://www.imperva.com/learn/data-
security/data-breach/ (last visited Sep 9, 2024).
becoming outdated. This guarantees the most up-to-date security measures and reduces the
possibility of being exploited.27
Encryption safeguards data during transmission and while stored. Employ Transport Layer
Security (TLS) to cipher data while it is being sent. Employ disk encryption as a means of
safeguarding data while it is stored. Deploy comprehensive encryption measures to safeguard
sensitive data throughout the whole data transmission process. Utilize secure protocols such
as HTTPS and S/MIME for the purpose of communication. Consistently evaluate and revise
encryption keys and certificates to minimize the risk of unwanted access.
Periodic security audits and risk assessments help to detect weaknesses and potential threats.
Perform yearly or semi-yearly audits to assess security status. Utilize risk assessment
frameworks such as NIST or ISO 27001. Conduct an analysis to determine the most
important resources, potential dangers, and weaknesses. Evaluate the probability and
consequences of prospective assaults. Allocate resources to address remedial tasks in order of
their level of risk severity. Execute the suggested actions from the audit to resolve the
vulnerabilities that have been found.
Incident response strategies guarantee prompt and efficient reaction to security events. Create
an all-encompassing incident response strategy. Provide definitions for event categorization,
response teams, and communication methods. Implement protocols for containing,
eliminating, and recovering from incidents. Regularly do tabletop exercises and training
sessions to guarantee the readiness of the team. Regularly revise the strategy to effectively
mitigate emerging threats and weaknesses.
Cybersecurity training imparts knowledge to staff and users on optimal methods and
procedures. Create an all-encompassing training curriculum. Address subjects such as
phishing, password administration, and data management. Organize frequent training sessions
and phishing simulations. Promote a culture that prioritizes and fosters understanding of
27
21 Cybersecurity Tips and Best Practices for Your Business [Infographic] - TitanFile,
https://www.titanfile.com/blog/cyber-security-tips-best-practices/ (last visited Sep 9, 2024).
security. Offer specialized training programs tailored to certain job functions, such as
software developers and system administrators. Regularly revise training materials to
effectively address emerging threats and vulnerabilities.
Secure communication methods ensure the protection of data while it is being sent. Utilize
HTTPS (Transport Layer Security) for web-based communication. Utilize S/MIME or PGP to
encrypt email communications. Employ secure protocols such as SSH for remote access.
Deploy DNSSEC as a measure to mitigate the risk of DNS spoofing. Employ a web
application firewall (WAF) for safeguarding web applications. Periodically evaluate and
revise communication methods to guarantee compliance with the most up-to-date security
benchmarks.
A secure data center ensures the protection of sensitive data. Select a data center that has
strong physical and logical security measures in place. Ensure adherence to standards such as
SOC 2, ISO 27001, or PCI-DSS. Utilize a data center equipped with backup power, cooling,
and network connection. Enforce access rules, use surveillance systems, and utilize motion
detection technology. Consistently assess and enhance data center security measures.
A Zero Trust Architecture validates the identification and authorizations of all users and
devices. Deploy a Zero Trust architecture that operates on the assumption that all networks
have been hacked. Implement multi-factor authentication (MFA) and restrict access to just the
necessary privileges. Authenticate the device and user's identity prior to authorizing access.
Consistently observe and verify the actions of users and devices.
Artificial intelligence (AI) and machine learning (ML) are capable of promptly identifying
and reacting to potential dangers as they occur. Deploy artificial intelligence (AI)-enabled
security solutions that assess network traffic, records, and user activity. Utilize machine
learning techniques to detect and analyze trends and abnormalities. Utilize AI-driven
playbooks to automate incident response. Consistently educate and enhance AI models to
tackle emerging risks and weaknesses.
Deploy a Zero Trust Architecture: Zero Trust operates on the assumption that all
networks have been hacked. It authenticates the identity of the user and device before
allowing access, using multi-factor authentication, offering just necessary privileges,
and constantly monitoring.
Employ Multi-Factor Authentication: Multi-factor authentication necessitates
supplementary verification methods beyond passwords, such as biometrics, smart
cards, or one-time passwords, in order to thwart illegal access.
28
How Governments can Improve Cybersecurity | JPMorgan Chase,
https://www.jpmorgan.com/insights/cybersecurity/business-email-compromise/threat-public-sector (last
visited Sep 9, 2024).
Execute an Incident Response Plan: An incident response plan sets down protocols for
addressing security issues, including notification, containment, eradication, recovery,
and post-incident operations, with the aim of minimizing impact and disruption.
Implement Consistent Cybersecurity Training: Consistent cybersecurity training
programs aim to educate people on the most effective cybersecurity practices,
phishing attacks, and security rules, fostering a culture of heightened security
awareness and accountability.
Implement Continuous Threat Monitoring: Continuous threat monitoring is the
ongoing and real-time surveillance of security-related data, threat intelligence, and
vulnerability feeds. This allows for staying up-to-date on new threats and
vulnerabilities, and making necessary adjustments to security measures.
Employ Secure Communication Protocols: Implementing secure communication
protocols such as HTTPS, S/MIME, and PGP safeguards data while it is being sent,
guaranteeing confidentiality, integrity, and authenticity, and thwarting eavesdropping,
tampering, and spoofing attempts.
Deploy an Identity and Access Management (IAM) System: An IAM system oversees
user identities, access, and privileges, guaranteeing that only authorized individuals
may access resources. This is achieved by approaches such as authentication,
authorization, and accounting (AAA).
Employ Data Loss Prevention (DLP) Tools: DLP tools are utilized to identify and
thwart the unauthorized extraction of sensitive data. These tools employ methods like
as data categorization, encryption, and access restrictions to safeguard confidential
information.
Perform routine vulnerability scanning: Routine vulnerability scanning involves the
use of tools such as Nmap, Nessus, and OpenVAS to identify vulnerabilities in
systems and applications. This helps prioritize efforts to fix these vulnerabilities and
prevent them from being exploited.
Deploy a Cybersecurity Framework: A cybersecurity framework implements a
systematic approach to cybersecurity, using standards such as NIST Cybersecurity
Framework, ISO 27001, and COBIT, to guarantee thorough security measures and
ongoing enhancement.