Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
As you progress up the chain to the top of your organization, you will need to stay abreast of developments in technology and in the law. The most impactful mistakes in cybersecurity law are made at t
As you progress up the chain to the top of your organization, you will need to stay abreast of developments in technology and in the law. The most impactful mistakes in cybersecurity law are made at the top. We never seem to run out of recent examples.
There have been a number criminal and civil legal actions filed as a result of the SolarWinds Orion hack. The company was sued by their pension fund, and by their investors, as well as others. Pick at least two cases from the list of links below, and discuss the facts, the legal lessons learned, and what the leadership at SolarWinds should have done to protect their company or employees from legal vulnerabilities.
Write a paper that describes the facts of your chosen cases and discusses the legal considerations and the lessons learned for cybersecurity ops leaders. There is not a length requirement for your paper, but it should fully address the prompt. For Standard Paper Assignment Guidelines and APA formatting information, see the "Course Resources" link in the left navigation area of the course.
- @
- 723 orders completed
- ANSWER
-
Tutor has posted answer for $10.00. See answer's preview
*********************** ************************** ******** 2020 ** *** discovered that * sophisticated cyber-attack had been ******* *** ******* the ****** ****** ********** and ******* companies by ******* ********** **** *** ******* government *** attack **** a ************* in ******** made ** ********** a *********** company ********** ******** ** management ******** ** **** ***** organizations ********* *** ** ********** *** hackers ***** ****** ********* **** **** SolarWinds' ******** ******* ***** were downloaded *** installed by SolarWinds' ********* This gave the hackers * *** to **** ****** ** *** ******** of *********** ********* *** carry *** further attacks ******* & ******* ******** ********** **** ** believed ** **** ***** ** ***** 2020 *** went ********** *** many ****** ** ** ******* ******* *** **** damage *** **** ** *** **** organizations were ******** ***** the ** government has ********* **** ***** ********** ********* *** **** **** ******** **** *** malicious **** *** ******* *** ******** ** **** *** ****** ** *********** ******** ******* *** ****** **** months before *** ****** *** ************* ********** **** has been described ** *** of *** **** ****** ************* ** ****** ***** ** ** believed to **** **** ******* out ** * group ** hackers ***** ** Cozy **** ** APT29 ***** is associated **** the ******* intelligence agency The ** government *** *** ******** ******* the Russian government ** ***** ****** *** ****** *** ** ** ****** ******** **** *** ******* *** involved The SolarWinds hack is believed ** be part ** * ******* ******** ** cyber-attacks and espionage ******* *** ** ********** and ******* ********* ** *** ******* *************** ********** **** has caused a ***** deal of ****** and ********** The ** government *** been ****** to take ****** ** secure *** ******** and ******* *** **** ******* ********* **** **** **** ******** *** ******* ****** ****** ** * ***** **** ** sensitive *** ************ *********** *** *** **** ****** of *** ****** is not *** ***** The ********** **** ** a *********** ******** ****** **** *** raised ******* concerns about the ****** and security ** *** ******** *** ***** securityThe legal ************** There are a few ***** ************** to ******** when ********** *** ********** **** ***** ** ** ********* ** note **** **** hack *** * ******** ****** **** ************ ******** ********** *** its ********* **** ***** ** is unlikely **** *** hackers **** ** ****** and ******* ***** *********** ********** **** ******* **** **** ****** be ******* under ********* or ******** ******** **** ****** ** ** essential ** ******** **** **** **** compromised **** ** the **** sensitive *********** **** ** the US government ******* ***** This means **** ***** ***** ** severe ******** security ************ ** * ****** ** the **** Third ** is also ********* ** consider that SolarWinds ** publicly ****** **** means **** ***** ***** ** ****** financial ************ *** *** company ** * ****** ** the **** Overall *** ********** hack ** * serious ***** **** ********* legal ************ for both the ** government *** *************** Lessons ************ *** ******* ***** ******* ** ** ******* from *** ********** **** ******* ** ** ********* ** ****** **** *** ******** *** ******* *** ******* *** ******* ** *** *** *************** Secondly ** ** ********* ** **** robust security ******** in ***** ** ****** and ******* ******* ******* ** is ********* ** **** * **** ** ******* ** *** ******* **** * cyber-attack *** ******* ** is essential to ********* **** *** *********** *** ***** organizations in investigating and *********** ***** *********** *** ******* *** ********** hack ********** *** importance ** ****** cyber ******** ********* It also highlights the **** *** ****** *********** *** *********** sharing ******* *** ******* sector and ********** ** ****** ******* ******* *** respond ** ***************** ****** *** leadership ** ********** **** **** ** ******* ***** ******* ** ********* **** ***** vulnerabilities?There *** a *** ****** the ********** at ********** ***** **** **** to ******* ***** ******* ** ********* **** legal *************** Firstly **** ***** **** *********** better ******** ******** to prevent hackers **** ******* ****** ** their ******* ** *** first ***** ******** **** ***** **** been **** *********** **** their ********* ***** the ***** ** working with sensitive data *** *** ********** ** ******* ** secure ****** & Isabella ***** ******* **** ***** **** ******** **** ******** and ******* ** ********* ** ********** themselves **** ****************** no ****** ** **** 100% ****** *** ********** at SolarWinds ***** **** ***** ***** to **** ** **** difficult *** ******* ** **** access to ***** ******* *** data They could have *********** **** ****** authentication measures such as ********** ************** and better ********** ********** **** **** could **** kept ***** ******** ** ** **** **** *** ****** security ********************* ********** could **** also **** **** *********** **** ***** ********* ***** *** ***** ** ******* **** sensitive **** **** ***** **** educated ********* ** the importance ** ******** data and provided **** **** the ********* ***** and training Additionally they could have implemented policies and ********** ** ***** access ** ********* **** ** **** ***** *** need *********** *** leadership at SolarWinds ***** **** ******** **** training *** support ** ********* on ********** ********** **** ************* They ***** **** ******** ********* on the ********** ** keeping ***** personal *********** ****** *** ******** **** **** *** ********* ***** *** ******** ************ **** ***** **** *********** policies and ********** to ***** ****** to ********* **** ** only those *** **** it ReferencesDaniel * ****** *** ********** ***** Hack ********* *** SolarWinds Orion Hack Explained Retrieved October ** **** **** https://wwwtrentonsystemscom/blog/solarwinds-hack-overview-preventionKatie * ***** ******** * ****** **** ** *** ********** **** and *** Is ** a *** ***** ******** ******* ********* ******* 18 **** **** ********************************************************************************************************************** O ***** ******* * (2022) SolarWinds **** ********** Everything *** **** ** know ********* ********* October ** **** from ***********************************************************************************************