Assignment 2 – Speakers
Speakers代写 In this report, two speaker lectures will be explained on how they were presented to address the information Assurance···
In this report, two speaker lectures will be explained on how they were presented to address the information Assurance, what they concluded and the tie with the course, as well as their comparison. The two speakers discussed are Mr. Dave Ratisher who gave a lecture on the Mueller election hacking report and Ms. Patricia, who is the IA expert at Apple Inc. and give a presentation on the information assurance and security. The purpose of this paper is to build the understanding of the IA issues as presented in both lectures and how they relate to the coursework.
Mr. Dave Ratisher Presentation Speakers代写
It was on a Tuesday, 27th in the evening when Dave Ratisher gave the talk on the alleged election and voting risk. The speaker mainly focused on Robert Mueller report on 12 Russian hacking of the DCCC and the Democratic campaign (Chang 2018). In the talk, he presented the risks that made the information assurance vulnerable to the attack. In essence, the issue was, what went wrong during the 2016 presidential campaigns and during the election and the risk which were pertinent to it. The speaker addressed on the issue in the dimensions of what happened and what could have been done to mitigate the information integrity issues.
The discussion of the Mueller report was important as it informed more of the issues of information assurance and how such information can be vulnerable from the attack if no proper caution measures are taken. The election hacking is a practical and perfect example of how even seemingly secure system can be vulnerable to the attacks, therefore, triggering a question on what about the smaller projects like a company information system? As the audience and the learning student of IA, the presentation was mind opening.
Mr. Dave used a practical approach to present his report. Speakers代写
To start with, he illustrated the five pillars that ensure security measures for information assurance according to the Department of Defense Cyber Security Model
Mr. Dave then proceeded to explain how the Russian hackers stole information from the Democrats using flow diagrams. In the diagrams is the FBI special counsel Robert Mueller’s indictment against the 12 hackers. It describes how they allegedly stole data from the DCCC and Democratic National Committee as well as from some member of the Hillary Clinton campaign.
The hacking of Clinton campaign started in March 2016 using email phishing. The email-phishing use scam emails which trick the user into giving sensitive information like passwords. One of the staff members allegedly fell into this trap and was requested to reset the email password. Another trick used excel file which when it opens it redirects the user to the Russian website as shown in figure 1.
Figure 1: How Clinton campaign was hacked using email phishing
The speaker also explained how the DCCC and DNC were hacked as shown in figure 2. Speakers代写
The hacking took place in around 2016 when the Russian spy officers targeted DCCC and DNC. The attackers first gained privileges to the DCCC networks which they used to gather information to access the DNC networks. The Mueller report showed that the hackers installed X-agent malware in the group computers. The program gathered information using user activities through the keystrokes and the screen activity by taking screenshots. Through this effort, the hackers were able to harvest passwords, research on the opposition, internal communications, banking transactions and more.
Figure 2: How DCCC and DNC were hacked by Russians
Ms. Patricia Presentation Speakers代写
The other speaker, Ms. Patricia, who was an IA specialist at Apple Inc. The lecture took place on Wednesday, 28th at the university hall. She attended for presentation in a CIS Graduate Seminar on the information assurance and cybersecurity. Here, the speaker addressed the increasing rate of cyber-attacks and system vulnerabilities in the organizations as well as individuals. The question that she raised was how we could ensure information security in our daily communications?
She used both scientific and descriptive approach in making her assertions. In so doing, she used the Facebook–Cambridge Analytica data scandal as a perfect example in explaining the information security and cybersecurity (Chang 2018). In the scandal, Facebook was probed for the integrity of their client data which was accessed by political campaign consultants in Cambridge Analytica.
Cambridge Analytica is a political and marketing consultant who mainly depend on the data mined from the third parties.
Comparison, Ties, and Application Speakers代写
Close analysis on both speakers, it was evident that information security has become a significant threat in today’s information assurance. They also seemed to agree on the critical components to ensuring data integrity which includes Availability, Integrity, Authentication, Confidentiality, and Non-repudiation (Infinit-o 2018). Therefore, organizations and information security experts have the responsibility to track of the network communication to ensure any breach is identified, analyzed and solved. According to the Mueller report on election risk, the worker needs to have specialized training on matters system and cyber security for them not to fall prey to hacking which may jeopardize the integrity of the whole organization.
The two lectures considerably inform on the classroom course through the real-world events regarding information assurance. They also offer in-depth insight into the current issues affecting information communication and how they can be controlled. Notably, the lectures illuminated more on the coursework regarding the data security and measures.
Information assurance has become a modern trend as it has been observed from the speaker’s perspectives. Therefore, individuals and organization must install mechanisms to detect and control information breach and leaks like the case of Facebook and DCCC as well as DNC hacking. To protect the system, the IA specialists need to use the modern methods of data encryptions, anti-malware, and firewalls. Above all, proper training of the employees on the matter of system security is also essential in IA security measures.
Chang, A. 2018. “The Facebook and Cambridge Analytica scandal explained with a simple diagram,” Vox, (available at https://www.vox.com/policy-and-politics/2018/3/23/17151916/facebook-cambridge-analytica-trump-diagram; retrieved November 28, 2018).
Chang, A. 2018. “How Russian hackers stole information from Democrats, in 3 simple diagrams”, Vox, (available at https://www.vox.com/policy-and-politics/2018/7/16/17575940/russian-election-hack-democrats-trump-putin-diagram; retrieved November 28, 2018).
Infinito. 2018. “The 5 Pillars of Information Security and How to Manage Them”, Infinito, (available at https://resourcecenter.infinit-o.com/blog/the-5-pillars-of-information-security-and-how-to-manage-them; retrieved November 28, 2018).