In this scenario, hackers launch cyber-attacks that affect several parts of the nationâs financial infrastructure over the course of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be canceled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers, and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future.

Respuesta :

Answer:

The counter measures that need to be implemented to prevent cyber attacks from occurring in the future are (1) By implementing an enterprise wide security policy. (2)designing a breached network.

Explanation:

Each day in the world of technology getting to it's height years and day by each day a new technology gadgets are been released. in the same way, the threats of getting attacked by hackers are also on the rise by the day.

These days the cyber cells are quite very sensitivities in based on the cases of getting attacked and the ATM machines are also one of the systems that can be hacked so in order to stop this from occurring, the Technology teams and cyber cells should have taken some counter or preventive measures as there are many of them. in this case we are discussing some of these as measures which is given below:

  • Implement the enterprise wide security policy: A good security policy plays a vial role in the protection from hacking  for any bank as the IT team just has to maintain a pure modification or preventive security system. this  will help the data Implement the enterprise wide security policy: As a good security strategy plays a vital role in the protection from hacking  for any bank as the IT team just has to maintain a pure preventive security system. As It will help the people data to be protected . As the bank’s systems find the technique or tool for a network to work with lower risk.
  • Making a breached network:  when an actual network breaching is carried out, the network segmentation can be realized through by making different network zones, different limits as in this way the expertise for a hacker will be lessened and he will have to compromise by leaving it.