Assignment 3 Research Paper
Assignment 3 Research Paper
Student name
Institution
Instructor/Professor
Date
2
Introduction
new technologies and effective computation. The growing numbers of constantly advances and
attempts in the form of cyber threats require well developed countermeasures and solutions for
critical data leakage prevention. Thus, this research paper explores the modern cybersecurity
topics, the threats which exist in the modern world, and the corresponding countermeasures.
Thus, through reviewing the recent literature and the cases discussed in the paper, the reader is to
be enlightened about the constant challenges of protecting networks and information and the
necessity to keep on improving cybersecurity measures. The major argument made in this paper
is that modern cybersecurity needs a combination of cyber education, the integration of the
It is now apparent that the frequency and intensity of threats in cyberspace have increased
tremendously in recent years. For instance, in Q4 of year 2023, Kenya registered 1. 2 billion
cyber threats, but one has to appreciate that this is a global problem (Obura, 2024). These threats
encompass phishing, ransomware, and other forms of data attacks that involve hacking into
users’ systems. This desire has only been amplified due to the adoption of new technology and
the world evolving into remote working environments hence the need to establish strong
cybersecurity measures.
Phishing attacks are one of the most common types of attacks that cybercriminals launch.
Some of these attacks involve sending scam emails to the victims asking them to share their
3
identity details or downloading links from the hackers. After making a phishing attack, the
cybercriminals manage to get access to the user’s data which they can use for economic purposes
or other attacks. McIntosh et al. (2023) pay attention on the necessity of checking the security of
the email’s organizations and the awareness of employees of the risks of phishing.
Another major threat that is currently making the rounds is ransomware; this is a
malicious software that encrypts a victim’s data and demands that he or she pays a ransom to
have the data decrypted. These attacks can lead to significant operational disruptions and would
mean millions of dollars in losses. Ransomware attacks became widespread globally in 2023,
education systems. Nwankpa and Datta, (2023) note that regular data backup and threat detection
systems are measures that can reduce the impact of ransomware attacks.
Advanced Persistent Threat (APT) are another form of cyber threat which is different
from simple malware. Where the attack pattern is more profound, these are commonly executed
and cover their tracks for long. Their objectives are to gain unauthorized access to corporate
information or sabotage essential activities. It has become apparent that APTs continue to
become more advanced, which means that organizations should improve their threat recognition
and defense mechanisms. FitzGerald and Otis (2024) note the need to monitor networks 24/7 to
Data loss or leakage are some of the most worrying areas of cybersecurity to this date.
One good example of this is the AT&T data breach where the personal information of 7.6 million
customers was leaked on the dark web (FitzGerald & Otis, 2024). Such incident not only
4
compromises the customer loyalty but it also poses severe financial and reputation cost to the
organizations. Companies can lose a large sum of money because of the fines incurred, legal
expenses and that of repairing the damage. The organizations may also be sued by the affected
customers and partners, which will be other added expenses. Apart from the financial effects,
data breaches may have indirect negative effects on an organization by reducing customer trust
Internal control measures together with timely response procedures are considered highly
essential to reduce the effects of data leakage and protect critical information. The authors Zhou
and Huang (2024) state that due to this, it is necessary to have an effective set of security policies
and measures so as to avoid such cases and if any case occurs then the impact is minimized. This
includes; the use of enhanced encryption techniques, periodic vulnerability audits and
Data breaches have consequences that do not solely affect the companies in question.
This is because private information that is comprised in the database of the organization may be
sold or leaked which makes the customers vulnerable to identity theft or even loss of money and
invasion of their privacy. These incidents can also reduce the confidence the society has on the
digital services and in turn limit their ability to engage in digital services which is a challenge to
It is also crucial for employers to encourage their employees to embrace cyber curiosity,
as well as establish strong cybersecurity measures to be ahead of new and improved cyber
threats. Nwankpa and Datta, 2023 argue that cyber awareness programs play a vital role in
5
strengthening the offline supervision of employees. Through raising awareness of threats that
could occur in the workplace and the right measures that should be taken, organizations can
greatly reduce the chance of the possible success of the hackers. Not only does this greatly
mentality as well.
Moreover, the concept of cohesive first-tier cybersecurity policies reflects solid goals and
objectives required for a sound response plan during any cyber threat. Such policies contain
procedures on reporting incidents, data privacy and protection especially for instances of attack
and addressing roles and responsibilities of employees regarding cybersecurity, thus increasing
McIntosh et al. (2023) amplify these findings by stating that there is a need for training
and awareness standards to be more ongoing. They contend that it is imperative to provide
continuous training to the employees to put them on an informed stand concerning current cyber
risks and prevention. With an informed workforce, men and women armed with the necessary
knowledge and understanding of the threats posed, everyone in an organization becomes a first
line of defense against cyber threats, able to spot suspicious activities as well as alert to safety
prompted by real cyber threats as opposed to reactive measures that focus on remediation.
McIntosh et al. (2023) present, an exploration of a novel approach involving the use of GPT-4 in
creating cybersecurity GRC policies to address ransomware risks. By using artificial intelligence
and advanced processing techniques, enormous datasets can be processed and the identification
6
of emerging threat signals, determination of which risks are likely and how they will be
executed, and more importantly, the execution of countermeasures to prevent cyber incidents
Read (2024) has found evidence for the adoption of emerging technologies to help boost
performing and identifying anomalous events and threats and also respond to them in a timely
manner. These technologies allow cybersecurity teams to reduce threat detection and response
processes to more of automated system, freeing up the team to think tactically, and pursue threat
prevention instead of spending most of their time dealing with threats as they occur.
The most recent data breach incident at AT&T is one that organizations can relate to, and
why it is important for entities to have proper incident response management measures in place.
When customers’ personal data and other accounts were compromised and surfaced on the dark
web, AT&T quickly changed customers’ passcodes with some urgency (FitzGerald & Otis,
2024). To this effect, the immediate action employed assisted in limiting exposure and possible
Such a proactive action of AT&T shows that organizations must be ready with strategies and
response plans to minimize the effects of the cyber occurrences. Effective incident response
Timely Detection and Response: This emphasizes the need to immediately identify the
breach and take measures that will ensure no more losses are incurred. Kaplan &
7
Greene’s (2015) communication role is evidenced by AT&T’s ability to identify and act
them informed and to address their concerns to regain their trust and manage their
cybersecurity measures at any given period and enhancement of measures after any
intrusion. It is thus important for organizations to use such occurrences as a wake-up call
Cybersecurity in Kenya
Kenya has been very proficient in preventing attacks from occur and has detected 1. 2
billion cyber threats in Q4 2023’ shows a concrete appreciation of the nation to cybersecurity
(Obura, 2024). There exists a great upturn in the threats posed by cyber-criminals, but due to
increased investments in threat identification equipment’s and synergy of governmental and non-
This shows that Kenya has come up with strategies that can be copied by other nations as they
beef up their cyber security measures. Key elements of Kenya's cybersecurity strategy include:
technological tools aimed at monitoring threats as they occur. These systems help reduce
the likelihood of attacks before they reach the level of an organized campaign.
8
create a coherent system. Pooling threat intelligence and resources help to increase
consciousness sensitization ensure the stakeholders are well informed about security
measures and changing risks. Developing a cyber workforce is critical towards enhancing
Both case studies highlight critical lessons for organizations and nations alike: Both case studies
Preparedness is Key: Measures like making sure there are effective and exhaustive
response strategies in place and ensuring that there has been adequate incorporation of
Continuous Adaptation: This indicates the necessity of constant adjustment of the existing
measures and tools on cybersecurity since threats in the cyberspace constantly develop.
Analyzing these cases, organizations and governmental bodies can derive the best practices in
the sphere of cybersecurity, strengthen their protection, and protect from new types of threats in
Conclusion
9
constant innovation and zeal from different organizations across the globe. Thus, with the focus
on cyber-awareness, sound and comprehensive policies, and sophisticated technologies, one can
beef up organizational defenses against ever-growing cyber threats. As demonstrated with the
help of the AT&T data leak crisis, as well as Kenya’s steps in this sphere, it is pertinent to stress
that prevention works. Thus, further steps in cybersecurity education and technology
development should be made to guarantee an effective predictive and protective system for an
References
Brendan Read. (2024). Cyber in 2023 and 2024. Governance Directions, 76(1), 13–15.
https://usmaiumgc.primo.exlibrisgroup.com/permalink/01USMAI_UMGC/1d2pi61/
cdi_rmit_apaft_search_informit_org_doi_10_3316_informit_T202403130000910151062
9983
McIntosh, Timothy, Liu, Tong, Susnjak, Teo, Alavizadeh, Hooman, Ng, Alex, Nowrozy, Raza, &
Watters, Paul. (2023). Harnessing GPT-4 for generation of cybersecurity GRC policies: A
https://usmaiumgc.primo.exlibrisgroup.com/permalink/01USMAI_UMGC/1d2pi61/
cdi_crossref_primary_10_1016_j_cose_2023_103424
Nwankpa, Joseph K., & Datta, Pratim Milton. (2023). Remote vigilance: The roles of cyber
awareness and cybersecurity policies among remote workers. Computers & Security, 130,
103266https://usmaiumgc.primo.exlibrisgroup.com/permalink/01USMAI_UMGC/
1d2pi61/cdi_crossref_primary_10_1016_j_cose_2023_103266
Zhou, Fuzhao, & Huang, Jianning. (2024). Cybersecurity data breaches and internal control.
https://usmaiumgc.primo.exlibrisgroup.com/permalink/01USMAI_UMGC/1d2pi61/
cdi_elsevier_sciencedirect_doi_10_1016_j_irfa_2024_103174
FitzGerald, Drew, & Ginger Adams Otis. (2024). AT&T Reset 7.6 Million Customers’ Passcodes
After Data Breach; Account holders’ information was leaked on the dark web about two
weeks ago but appears to have come from 2019 or earlier. The Wall Street Journal.
Eastern Edition.
11
https://usmaiumgc.primo.exlibrisgroup.com/permalink/01USMAI_UMGC/1d8vdjr/
cdi_proquest_newspapers_3020559193
Obura, F. (2024, February 9). Kenya detected 1.2bn cyber threats in Q4 2023. Kenyan Wall
Street. https://kenyanwallstreet.com/kenya-detected-1-2bn-cyber-threats-in-q4-2023/
Ferdiana, R. (2020, November). A systematic literature review of intrusion detection system for
network security: Research trends, datasets, and methods. In 2020 4th International
Nkonge, B. P. M. &. A. (2023, July 28). Kenya cyber-attack: Why is eCitizen down?
https://www.bbc.com/news/world-africa-66337573