I have included document, that has two discussion. Please reply to each discussion with at least 150 words not including references or any other text.
Total 2 replies each with at least 150 words
Pages: 1DISCUSSION 1
The worst-case scenario:
1.NotPetya is Windows-based ransomware, which infected many organizations in the world in 2017. This was a massive cyberattack that created havoc around the globe. Many insured organizations were seeking positive responses from their insurer organization for compensation of loss caused by this cyberattack. Many insurance organizations had a clause for the compensation that restricted any compensation in case of damage caused due to the ‘act of war’. The UK government and CIA blamed Russia for this attack and tagged it as a state-sponsored cyberattack. After this statement, all insurance companies tagged this attack as an ‘act of war’ and denied any compensation. This attack was seen as an element of the Russia-Ukraine war. But because of this blame game mitigation action got delayed that caused massive loss across the globe.
The best-case scenario:
GitHub DDoS attack
2.In 2018, GitHub, a web-based provider of hosting service for the development of software, faced a massive DDoS attack, which impacted millions of its users across the globe. It also affected the page of the GitHub. GitHub was alerted to a drop in the availability of its services from its cloud agents across the globe. The availability of HTTP servers to its website observed a dip of 26%. The DDoS attack aimed to overtake resources to shut down access to service temporarily. But within minutes, GitHub efficiently mitigated this DDoS attack. It was identified that the defense mechanism of GitHub came into action quickly. The most impressive fact in this mitigation stage was that the entire mitigation process and detection were automated. Within fifteen minutes the attack had been overcome by GitHub, and its traffic continued as normal.
So, a worst-case scenario like NotPetya can learn from the best-case scenario like GitHub. It can learn that a fast and efficient response in the attack detection process and mitigation process could mitigate the potential loss. An automated detection and mitigation process can handle massive attacks quite efficiently, and it is a much-needed system in the present technological era of the globe.
1.NotPetya Malware: Everything You Need to Know | Digit.in. (2020). Retrieved 7 October 2020, from https://www.youtube.com/watch?v=9Z-H8ku7s6c
2.How GitHub Defended Against Largest Recorded DDoS Attack. (2020). Retrieved 7 October 2020, from https://www.youtube.com/watch?v=tztjDBTud7M
Best Scenario: Dunkin Donuts DD
VIDEO URL: https://www.usatoday.com/story/money/business/2018/11/29/dunkin-donuts-says-some-dd-perks-accounts-hit-data-breach/2152176002/
DD encountered an attack to steal credential information to sell it on the dark web. To this, the hackers used the DD perks accounts which customers use to login and store their points and discounts. The user credentials usually consist of a username and personalized 16-digit account number and password. This w