Read the following synopses. search and read 2 additional sources of information on the topic covered, and list those URLs. Write a short analysis of the issue and how we, as cybersecurity professionals, are affected and/or can respond.16-year-old student arrested for allegedly crippling Miami school system withcyberattackYahoo Finance, 3 Sep 2020: A 16-year-old student was arrested Thursday for allegedly bringing down Miami- Dade County Public Schools’ (M-DCPS) virtual learning platform, which had been down for several days. According to the M-DCPS, district detectives traced the IP address responsible for the attacks to the student, who is a junior at South Miami Senior High School. “The student admitted to orchestrating eight Distributed Denial-of-Service cyber attacks, designed to overwhelm District networks, including web-based systems needed for My School Online. The student used an online application to carry out these attacks and has been charged with Computer Use in an Attempt to Defraud. A 3rd-degree felony and Interference with an Educational Institution — a 2nd-degree misdemeanor,” the district — the fourth-largest in the country — said in a statement that did not name the student. According to the district statement, it faced several connectivity issues resulting from both a malicious cyberattack and software malfunction, which it attributed to a problem with software provided by Cisco Systems. Cappos tells Yahoo Finance that other school districts around the U.S. could be just as vulnerable as the Miami-Dade County Public Schools. “Are other school systems vulnerable? Absolutely,” he said, adding that school districts need to practice proper maintenance on their systems, which includes properly installing updates. He suggests schools rely on the big players in the tech space such as Zoom, Microsoft, and Google rather than their own systems. “You absolutely 100% need to install your software updates. You need to get all your systems up to date. This is the most important security thing you can do. If you’re using cloud-type services, like Zoom, you’re effectively outsourcing the security of that part of your system to the company,” he said.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more