Need Help With This Assignment?

Let Our Team of Professional Writers Write a PLAGIARISM-FREE Paper for You!

Data Breach Incident at JBS Ransomware – Unauthorized Access and Security Failures

Data Breach Incident at JBS Ransomware – Unauthorized Access and Security Failures

Among the categories of cybersecurity, ransomware needs to be given attention due to the significant increase in attacks (Keary, n.d.). Ransomware refers to malware that uses data encryption to deny victims access to information and data to demand ransom payments from them. Potential ways to combat these attacks have been provided by Federal law, such as the Computer Fraud and Abuse Act (CFAA), which can be used to persecute the attackers (Berris & Gaffney, 2021). A recent notable incident is the May 31, 2021, JBS ransomware attack, which was the largest meat producer in the world and was attacked by REvil. This led to the disruption of its operations in multiple countries, such as the United States, Canada, and Australia.

A representative of cybersecurity management reported that JBS had many issues with its systems, including several malware infections. These vulnerabilities resulted in cybercriminals exploiting them. Credentials belonging to employees in JBS had been leaked earlier into the dark web, which implies that JBS had not put in place enough measures to detect these risks. Despite the 200 million dollars it spends annually on IT, it was still unable to prevent the ransomware attack.

The ransomware attack led to scrutiny of companies paying ransom in terms of the potential legal implications and the limitations of such practices. Some countries currently have already enacted laws to prohibit and restrict the payment of ransom (Ransomware Attacks on Critical Infrastructure Sectors, n.d.). It is mandatory to report ransomware attacks in some jurisdictions. This is to enhance transparency and aid in developing more effective countermeasures to such incidences. Shutting down several meat processing plants directly impacted people’s food security and livelihoods. This has led to stricter regulations for critical infrastructure sectors.

Effective strategies are required to prevent the rate of new ransomware attacks. One of the recommendations would be to use machine learning for detection. It provides different detection mechanisms for fraud, malware, and ransomware (Okonkwo et al., n.d.). Another countermeasure is to have a robust backup plan that would aid in recovering efforts following a data breach. The JBS incident has clearly shown that a dynamic approach is required when addressing cybersecurity threats. Not only technical solutions should be considered, but also legal and ethical frameworks that promote responsible practices to protect all parties involved.

References

Berris, P. G., & Gaffney, J. M. (2021). Ransomware and Federal Law : Cybercrime and Cybersecurity Report. Congressional Research Service, 1–18. https://crsreports.congress.gov

Keary, J. (n.d.). Rebuffing Russian Ransomware: How the United States Should Use the Colonial Pipeline and JBS USA Hackings as a Defense Guide for Ransomware. Retrieved March 3, 2024, from https://scholarship.shu.edu/student_scholarship

Okonkwo, R., Atoyebi, O., Sileno, M., & Patooghy, A. (n.d.). Surveying Security Policies and Infrastructure for Ransomware Attacks (2022). https://doi.org/10.13140/RG.2.2.22509.97769

Ransomware Attacks on Critical Infrastructure Sectors. (n.d.). https://www.dhs.gov/sites/default/files/2022-09/Ransomware%20Attacks%

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


The purpose of this assignment is to submit a topic for your final project. The instructor will review your topic and provide you with feedback on your topic choice.

Data Breach Incident at JBS Ransomware - Unauthorized Access and Security Failures

Data Breach Incident at JBS Ransomware – Unauthorized Access and Security Failures

Prompt
You will select a recent or current incident from the public record that will support the creation of an information technology incident report as described in the Final Project Document. Provide a rationale as to why you are interested in this topic.

What to Submit
You will submit a one-page Microsoft Word document with double spacing and 12-point Times New Roman font with one-inch margins.