Information Systems essayGaining unauthorized entry to a pc or a system is known as hacking. Hackers often attempt to acquire entry with a purpose to steal delicate data for private use or for use as ransom. That is unethical and in lots of circumstances illegal. Just lately the rise of hackers has induced nice concern within the cyber safety house, with the rise in digitization particularly throughout COVID there was an increase in cyber safety breaches as properly. One such well-known breach that induced nice havoc in and across the southern area of United States of America is the Colonial Pipeline breach (Bambauer, 2020)
In April of 2021, hackers gained entry to the colonial pipeline programs by way of an outdated password to an account that was not in use however was nonetheless accessible. It was accessed in the identical approach that workers would entry the colonial pipeline community, remotely. The password was obtained from the darkish net from an inventory of stolen passwords; this will have been a password that the person utilized in a number of locations. Moreover, the colonial pipeline community didn't have multi issue authentication. Hackers then went to demand a ransom in cryptocurrency, which prompted fast response from the cybersecurity group of the colonial pipeline to close down all of its operations.
This induced the transport of two.5 million barrels of gasoline per day to come back to a halt for few days, inflicting big losses for the corporate in addition to inflicting public inconvenience. Colonial pipeline additionally paid round $four.four million in France and to the hackers who had stolen 100 gigabytes of delicate information from them. The hackers are recognized to be linked with a Russian group referred to as the darkish aspect; this has warranted motion from the usgovernment to cease perpetrators from accessing key operational pc networks within the US in order to safeguard the nation (Mehrotra, Turton, 2021).
Mehrotra, Ok., Turton, W. (2021). Hackers Breached Colonial Pipeline Utilizing Compromised Password.Bloomber Information. https://www.bloomberg.com/information/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password
Bambauer, D E.(2020). Info Hacking. Utah Legislation Overview, no. four (August): 987–1007. http://search.ebscohost.com/login.aspx?direct=true&AuthType=sso&db=a9h&AN=144574920. -research paper writing service