Application Assignment 2: Krebs On Security ✓ Solved
Application Assignment 2 Krebs On Security
This application assignment involves investigating two recent cybersecurity topics/events covered on the website KrebsOnSecurity.com. KrebsOnSecurity.com presents the latest news and investigative reports on cybersecurity. This site is managed by Mr. Brian Krebs, who worked as a reporter for The Washington Post from 1995 to 2009 authoring over 1,000 blog posts for the Security Fix blog and well over 200 articles for The Washington Post newspaper and washingtonpost.com. Select two articles from the Website--one that details an information security concern and one that explains a new cybersecurity skill or knowledge. The articles must have been published in the last six months. For each of the two articles, you will then go find another article on the same topic from outside the KrebsOnSecurity.com site. Referencing both articles (e.g., the one from Krebs and the one from somewhere else), your job is to provide a summary of the topic--largely in your own words--explaining how you as a cybersecurity professional would use/apply the information. Limit your writeups to no more than one page for each of the two topics. When complete, submit your two writeups as a single Word document via the submission functionality. To summarize, this assignment involves identifying two articles from KrebsOnSecurity.com --one related to an information security concern and one related to a new security skill or knowledge base. For each of the two articles, find one other article about the topic from somewhere else, providing you with two perspectives on the same topic. Then, for each of the two topics you identified, write up a one page summary that incorporates information from both articles (the Krebs one and the non-Krebs one) you found. Submit the separate writeups via a single, two-page document that clearly delineates between the two different writeups.
Sample Paper For Above instruction
Article 1: Data Breach at Major Healthcare Provider and Its Implications
In recent months, KrebsOnSecurity reported a significant data breach affecting a large healthcare provider, exposing sensitive patient information and highlighting vulnerabilities in healthcare cybersecurity. The breach was attributed to phishing attacks that compromised employee credentials, leading to unauthorized access to internal systems. This incident underscores the critical need for healthcare organizations to enforce robust security awareness training and multi-factor authentication.
Correspondingly, an external article from HealthcareITNews discussed advancements in threat detection technologies tailored for healthcare environments. It emphasized deploying AI-driven security systems capable of identifying anomalous behavior indicative of cyberattacks in real time. As a cybersecurity professional, understanding such innovative solutions is essential to implement proactive defenses, especially in sectors storing highly sensitive data. Applying this knowledge involves integrating AI tools into existing infrastructure, conducting regular vulnerability assessments, and enhancing staff training to recognize phishing attempts.
Article 2: Learning Cybersecurity Incident Response Skills
KrebsOnSecurity recently highlighted a workshop focused on developing effective incident response skills for cybersecurity teams. The article detailed practical strategies, such as constructing comprehensive incident response plans, conducting simulated breach exercises, and maintaining communication protocols for stakeholders. The importance of continuous training to keep pace with evolving threats was also stressed.
An outside source, SANS Institute’s cybersecurity training programs, offers structured courses that cover incident handling and malware analysis. These programs provide hands-on experience with real-world scenarios, which are invaluable for cybersecurity professionals aiming to strengthen their response capabilities. To utilize this knowledge, I would enroll in such training, develop tailored incident response protocols for my organization, and participate in simulation exercises regularly to ensure preparedness against cyber threats.
References
- Author, A. (Year). Title of the external article. Journal/Website Name. URL
- Krebs, B. (Month Year). Title of KrebsOnSecurity article. KrebsOnSecurity.com. URL