SOLUTION! Question:1  In this discussion, I am going to talk about the data breach on the Fetal Diagnostic Institute of the Pacific in Honolulu, HI. I have posted the link under References [1]. It was cyberatta

Article Writing

Question:1 

Haven’t Found The Relevant Content? Hire a Subject Expert to Help You With
SOLUTION! Question:1  In this discussion, I am going to talk about the data breach on the Fetal Diagnostic Institute of the Pacific in Honolulu, HI. I have posted the link under References [1]. It was cyberatta
Post Your Own Question And Get A Custom Answer
Hire Writer

In this discussion, I am going to talk about the data breach on the Fetal Diagnostic Institute of the Pacific in Honolulu, HI. I have posted the link under References [1].

It was cyberattack that potentially breached close to 41,000 patients. Their PII was compromised. The hackers breached one of the institute servers, which included some patient records. The officials acted to contain the incident and contacted a cybersecurity firm. They were able to successfully remove the virus, clean the system and immediately contained the attack but they expected up to 41,000 patient information could have been compromised. The data of both past and current patients were impacted by the breach but the FDIP claimed they do not store the credit card details on their servers.

How could this have been avoided or control strategies to mitigate these:

The best ways to avoid any cyber-attack is by improving authentication and encryption.

Two Factor Authentication is one place to start with. 2FA expects whoever trying to access their data to confirm their identity in two different ways and this will be a problem for those who try to hack or use brute force kinds of attacks to hack into the system. There is always the extra safety that if a hacker could get one component right, he is probably going to get the next one wrong and so there will still be some level of trust. With this, you have a second layer of authentication and rather than entering just a username and password, you should validate yourself in 2 different ways. While this is only used in personal commodities like to access an electronic device or maybe to login to your bank account online, it might be too complicated for a health account but if we need to have security, its always best to use the safest way. This makes it harder for the attackers to access the online accounts because knowing the victim’s password alone is not enough to pass the authentication check. In single-factor authentication, user ID and password are not trustworthy. The major problem with password-based authentication is that not many people create and use diligent passwords and fail to change often even after reminders. Passwords are also prey to external threats, to brute force attacks, or even rainbow table attacks. Given time and resources, the password-based system can be easily hacked, and it’s being done easily in the modern-day world. All these can be avoided using 2FA. Different devices and services are used for implementing 2FA from tokens and RFID cards to smartphone apps. 2FA products can be divided into two categories: tokens which are provided to users to use to get into their account, and software that recognizes and authenticates users. This 2FA can also make use of an extra token/biometrics/voice recognition and any one of this can be used on top of the usual password to make it harder for it to be compromised. By having this 2FA, it wouldn’t have been easy for the attacker to get into the server and gain access to all this information.

References:

https:// 

I want 150 words explanation on above paragraph. you must include at least two citations and 2 references., your sentence must be start from, I like your post, I would like to add some more details on your discussion….

Question:2 

The selected article that outlines a recent security breach involves Credential Stuffing Attack Again that was experienced by Dunkin. The article has been retrieved from https://  By description, credential stuffing takes place when hackers employ combinations of usernames and passwords which are leaked from the other Websites and use them to get into other accounts at another website.  One control that would militate against credential stuffing is to use two-factor authentication (2FA). 2FA offers an additional layer of security and protection for the user accounts. With two-factor authentication (2FA), both username and password are needed for authentication and thus, entrenching the security model making it more complicated for the attacker to bypass or hack (Zhang et al., 2018). Since 2FA requires the second type of identification such as verification through SMS, which the hacker may not have, it reduces the chances that the hacker impersonates a user and gain access to the computers and reduces unauthorized access (Zhang et al., 2018).

References

Pymnts. (2019). Dunkin’ Falls Victim To Credential Stuffing Attack Again. Retrieved from https:// 

I want 150 words explanation on above paragraph. you must include at least two citations and 2 references., your sentence must be start from, I like your post, I would like to add some more details on your discussion….

Written Assignments
Get 20% Discount on This Paper
Pages (550 words)
Approximate price: -

Why Choose Us?

Quality Papers

We value our clients. For this reason, we ensure that each paper is written carefully as per the instructions provided by the client. Our editing team also checks all the papers to ensure that they have been completed as per the expectations.

Professional Academic Writers

Over the years, our Written Assignments has managed to secure the most qualified, reliable and experienced team of writers. The company has also ensured continued training and development of the team members to ensure that it keeps up with the rising Academic Trends.

Affordable Prices

Our prices are fairly priced in such a way that ensures affordability. Additionally, you can get a free price quotation by clicking on the "Place Order" button.

On-Time delivery

We pay strict attention to deadlines. For this reason, we ensure that all papers are submitted earlier, even before the deadline indicated by the customer. For this reason, the client can go through the work and review everything.

100% Originality

At Written Assignments, all papers are plagiarism-free as they are written from scratch. We have taken strict measures to ensure that there is no similarity on all papers and that citations are included as per the standards set.

Customer Support 24/7

Our support team is readily available to provide any guidance/help on our platform at any time of the day/night. Feel free to contact us via the Chat window or support email: support@writtenassignments.com.

Try it now!

Order Now to Get 20% Discount

We'll send you the first draft for approval by at
Total price:
$0.00

How our best essay writing service works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Written Assignments has stood as the world’s leading custom essay writing paper services provider. Once you enter all the details in the order form under the place order button, the rest is up to us.

Essays

Cheapest Essay Writing Service

At Written Assignments, we prioritize all aspects that bring about a good grade such as impeccable grammar, proper structure, zero plagiarism and conformance to guidelines. Our experienced team of writers will help you completed your essays and other assignments.

Admissions

Admission and Business Papers

Be assured that you’ll get accepted to the Master’s level program at any university once you enter all the details in the order form. We won’t leave you here; we will also help you secure a good position in your aspired workplace by creating an outstanding resume or portfolio once you place an order.

Editing

Editing and Proofreading

Our skilled editing and writing team will help you restructure your paper, paraphrase, correct grammar and replace plagiarized sections on your paper just on time. The service is geared toward eliminating any mistakes and rather enhancing better quality.

Coursework

Technical papers

We have writers in almost all fields including the most technical fields. You don’t have to worry about the complexity of your paper. Simply enter as many details as possible in the place order section.