Critical Analysis of White Paper: Types of Cyber Attacks and How to prevent them

Summary of the Paper

DELL Inc. authors the whitepaper. It outlines the latest types of cyber-attacks and the methods of preventing them whether in an individual basis or in the corporate environment. Criminals use different strategies to attack a secure network. First-attack strategy, they bombard the network around the clock to find a weakness on the network. To prevent such an attack, organizations need to put in place an up-to-date minute, real time protection against the latest threats. The second attack strategy is to infect the network with different forms of malware such as, Trojans, spyware, adware, computer worms, and computer viruses. Use network-based malware protection, intrusion prevention service (IPS), and continuous & timely updates. In cyber-attack strategy three, criminals find and compromise the weakest networks. An organization using a firewall that prioritizes security over performance may be forced to turn off or limit their security measures to keep up with work performance. An organization should use a firewall that provides both superior threat protection and high performance.

 

Literature Review

The entire whitepaper focuses on the latest types of cyber-attacks and the methods of preventing them. Wei, Lu, Jafari, Skare, & Rohde (2010, p. 1) define a cyber-attack as a malicious attack of computer systems, networks, and technology dependent enterprises. They have the ability to alter computer codes or personal data leading to disruptive outcomes that can compromise data and lead to cybercrimes. Radziwill (2015) asserts that cyber-attacks have become a common phenomenon in the present world and top corporations have ranked it as a top threat. Criminals have always stayed ahead of the game by deploying different strategies. However, organizations will only survive by devising unique strategies to prevent possible infiltration.

 

Dell affirms that criminals use different strategies to attack a secure network. First-attack strategy involves bombarding the network around the clock to find a weakness on the network. Adams (2015) claims that the constant bombarding of the network is meant to find a weakness on the malware protection applications. To prevent such an attack, organizations need to put in place an up-to-date minute, real time protection against the latest threats. The second attack strategy is to infect the network with different forms of malware such as, Trojans, spyware, adware, computer worms, and computer viruses. Carr (2011) asserts that hundreds of the variants are developed per hour. An organization needs to utilize network-based malware protection, intrusion prevention service (IPS), and continuous & timely updates. Strategy 3; criminals find and compromise the weakest networks. An organization using a firewall that prioritizes security over performance may be forced to turn off or limit their security measures to keep up with work performance. Therefore, firms should use a firewall that provides superior threat protection and high performance.

 

Quality of the Research

The whitepaper is an outcome of the continuous assessment of a large technology firm. The background research is clear and relevant because it begins by outlining the complex techniques that cybercriminals employ to steal organizational data. The whitepaper focused on different types of cyber-attacks and their resulting solutions, which depicts clarity. It serves an educative purpose for parties that might be unaware of possible attacks on their networks and computers. Therefore, it serves to influence the decision-making processes of current and prospective customers. It also serves as a foundation for a naïve reader to gain a deeper understanding of the discussed concepts.

 

Quality of Presentation

The work is well presented and utilized visual enhancement to make it persuasive and improve understanding. It is well structured with an introduction, problems, solutions, conclusion, and advertisement in the end. They uses symbols and concepts effectively. It emphasized on simplicity in language and a busy reader can gain the concepts quickly. Additional figures and tables should be used to increase readability. For instance, the author can provide appropriate statistics of the number of corporations that have suffered losses in a given period vis-à-vis the mentioned types of cyber-attacks. It gives a reader a clear picture of losses that come due to cyber-attacks and gives reasons for mitigation.

Additional Notes

Numerous websites have featured this topic albeit on diverse perspectives. For instance, papers on how to block the path of a cyber attacker with privileged account security and M-Trends, which provides trends on cyber-attack methods. The information provided in this whitepaper is viable due to the credibility of the company in the realm of technology. Companies as well as individuals can utilize the information to secure viable data and information.

 

References

Adams, C. (2015). Proceedings of the 15th European Conference on eGovernment, University of Portsmouth, UK, 18-19 June 2015. Academic Conferences and Publishing International Limited.

Carr, J. (2011). Inside Cyber Warfare: Mapping the Cyber Underworld. CA: O’Reilly Media.

Radziwill, Y. (2015). Cyber-Attacks and the Exploitable Imperfections of International Law. Leiden Boston: Brill – Nijhoff.

Wei, D., Lu, Y., Jafari , M., Skare, P., & Rohde, K. (2010). An integrated security system of protecting Smart Grid against cyber attacks. Innovative Smart Grid Technologies (ISGT) (pp. 1-7). IEEE .

 

 

 

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *