1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
3 years ago
8

In this scenario, hackers launch cyber-attacks that affect several parts of the nationâs financial infrastructure over the cours

e of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be canceled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers, and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future.
Computers and Technology
1 answer:
pentagon [3]3 years ago
6 0

Answer:

The counter measures that need to be implemented to prevent cyber attacks from occurring in the future are (1) By implementing an enterprise wide security policy. (2)designing a breached network.

Explanation:

Each day in the world of technology getting to it's height years and day by each day a new technology gadgets are been released. in the same way, the threats of getting attacked by hackers are also on the rise by the day.

These days the cyber cells are quite very sensitivities in based on the cases of getting attacked and the ATM machines are also one of the systems that can be hacked so in order to stop this from occurring, the Technology teams and cyber cells should have taken some counter or preventive measures as there are many of them. in this case we are discussing some of these as measures which is given below:

  • Implement the enterprise wide security policy: A good security policy plays a vial role in the protection from hacking  for any bank as the IT team just has to maintain a pure modification or preventive security system. this  will help the data Implement the enterprise wide security policy: As a good security strategy plays a vital role in the protection from hacking  for any bank as the IT team just has to maintain a pure preventive security system. As It will help the people data to be protected . As the bank’s systems find the technique or tool for a network to work with lower risk.
  • Making a breached network:  when an actual network breaching is carried out, the network segmentation can be realized through by making different network zones, different limits as in this way the expertise for a hacker will be lessened and he will have to compromise by leaving it.
You might be interested in
What is the family access code right now?
harina [27]

I dont know I'm so sorry I cpuldnt help

3 0
3 years ago
Search engines enable you to
Phoenix [80]

Located web pages related to a specific subject


Please let me know if you have questions !

4 0
3 years ago
What type of link is used to call this file
Deffense [45]
WAIT, you didn't leave a file. Please redo this question and tag me so i can help you.
7 0
3 years ago
What are the three main elements common to all radio ads?
Mama L [17]
Answer: final notions on frequency, reach, and consistency.



If my answers wrong please tell me :D
5 0
3 years ago
Read 2 more answers
What happens when two computers use the same IP address?
mr Goodwill [35]

Answer:

Its B, "irregular signals sent over the network"

Explanation:

When you duplicate IP addresses don’t make one machine controllable but they rather just <em><u>break</u></em><u><em> network connectivity.</em></u>

<u><em /></u>

<u><em>HOPPPPE THIS HELPPPPPPPPPPPPSS</em></u>

7 0
3 years ago
Other questions:
  • In the scene where we see Don and Lina acting in a silent film (beginning at time code 11:05), describe the silent film. How is
    7·1 answer
  • The equipment that processes data in order to create information is called the _______.
    8·2 answers
  • I want to customize my company's logo, name, address, and similar details in all my business documents what option should use?
    12·1 answer
  • Proper numeric keyboarding technique includes:
    15·1 answer
  • Write a function called convert_format which converts the format of a date from mm/dd/yyyy to month name dd, yyyy.
    12·1 answer
  • Write a program that allows the user to enter a time in seconds and then outputs how far an object would drop if it is in free f
    7·1 answer
  • Which of the following is an example of a content management system (CMS)?
    12·2 answers
  • One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet co
    7·2 answers
  • HELP ASAP 10 POINTS COMPUTER SCIENCE
    14·2 answers
  • 1. The NetworkManager or Systemd Networkd components must be installed on a Linux system in order to configure an IP address on
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!