Data security is a crucial aspect for every organization. Loss of data could prove to be perilous for any organization because the database of the organization consists of all the essential information such as personal bank account details, criminal history, flight details, and the patient history. It could be rightfully said that the loss of data to hackers and unauthorized users possess dire consequences for both the organizations, and the individuals. In this modern era it has become immensely important for the organizations to develop a plan for handling and protecting their essential data, as this serves as the central security plan for the organization and it also helps in fulfilling the privacy expectations of the employees, and the customers. In this paper the author is going to address the scenario in which a terrorist group has hacked into the entire computing system of the state (Geers, 2010). The hackers have used a virus attack, as they have used a specific piece of software code to infect the network system of the state. As a result of this attack the whole network of the state has been compromised including the network of the local police department, Fort Lauderdale Airport's computer system, the local hospitals network, and the network of South Florida bank.
It is because of this cyber-attack that the whole state is suffering, as the attack on the network of the local police department have resulted in the loss of record management systems and operating systems on laptops. The local hospital network is being compromised and is not allowing employees to access any information being stored on the hospital computers. The computing system of the Fort Lauderdale Airport is being compromised completely. The attack on the South Florida banking sector has resulted in the loss of millions of dollars. As a result of this attack every department of the state has suffered immensely (Brenner, 2009). The purpose of this research study is to develop a cyber-security prevention mechanism to prohibit these sorts of issues in the coming future, along with the retrieval of data that has been lost due to the virus attack.
Identification of the Virus Attack
Identifying a computer virus attack on a network could be immensely difficult as a virus enters the system and corrupt the files present on the computer. However, there are certain signs which can identify a virus attack. These signs are ...