Select Page

Assignment Helpers

Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

Read the following synopses. search and read 2 additional sources of information on the topic covered, and list those URLs. Write a short analysis of the issue and how we, as cybersecurity profession

Read the following synopses. search and read 2 additional sources of information on the topic covered, and list those URLs. Write a short analysis of the issue and how we, as cybersecurity profession

Yahoo Finance, 3 Sep 2020: A 16-year-old student was arrested Thursday for allegedly bringing down Miami- Dade County Public Schools’ (M-DCPS) virtual learning platform, which had been down for several days. According to the M-DCPS, district detectives traced the IP address responsible for the attacks to the student, who is a junior at South Miami Senior High School. “The student admitted to orchestrating eight Distributed Denial-of-Service cyber attacks, designed to overwhelm District networks, including web-based systems needed for My School Online. The student used an online application to carry out these attacks and has been charged with Computer Use in an Attempt to Defraud. A 3rd-degree felony and Interference with an Educational Institution — a 2nd-degree misdemeanor,” the district — the fourth-largest in the country — said in a statement that did not name the student. According to the district statement, it faced several connectivity issues resulting from both a malicious cyberattack and software malfunction, which it attributed to a problem with software provided by Cisco Systems. Cappos tells Yahoo Finance that other school districts around the U.S. could be just as vulnerable as the Miami-Dade County Public Schools. “Are other school systems vulnerable? Absolutely,” he said, adding that school districts need to practice proper maintenance on their systems, which includes properly installing updates. He suggests schools rely on the big players in the tech space such as Zoom, Microsoft, and Google rather than their own systems. “You absolutely 100% need to install your software updates. You need to get all your systems up to date. This is the most important security thing you can do. If you’re using cloud-type services, like Zoom, you’re effectively outsourcing the security of that part of your system to the company,” he said.

Be Smart, Order this paper Now

Can't find what you are looking for?

Post your question on MoreEssays.com and get help from one of our expert tutors in topics ranging from mathematics to rocket science!