IGI Global contributors express their thoughts on recent massive cyber-attack

WannaCry Ransomware, Cybersecurity Massive Scare

By Alex Johnson on Jun 2, 2017
In today’s technologically-inclined society most everything and everyone is connected, from the small devices we keep in our pockets everywhere we go to computers and tablets that are becoming more and more powerful with what they are able to do. But what happens when that same technological crutch is exploited and turned against the very people who depend on it daily?

wannacry, cybersecurity, ransomware, computer hack The most recent malware cyber-attack, dubbed WannaCry, was a brutal wake-up call that rang through over 100 countries, but focused primarily in Europe and the surrounding areas. The virus disrupted major parts of the international infrastructure, mainly healthcare services. Once a network was infected the virus would lock users out of their data until they paid a ransom in the form of Bitcoin, a type of digital currency. But just how did this global attack gain traction? The WannaCry ransomware infecting computer networks was based off an exploit in an older version of Microsoft Windows, which was originally discovered by the U.S National Security Agency (NSA). Any computer with this specific version of Windows that also did not download their most recent update, which was in March earlier this year, was susceptible to this attack. This information was then accessed by hackers and leaked online. The culprit(s), as well as the motive, remain unclear, but one thing that has been made blatantly apparent in these past weeks is that cybersecurity and cyberthreats are a very real and relevant concern.

Dr. Emily Stacey, a political science professor at both Rose State and Oklahoma City Community College, shared her thoughts on the incident.

“WannaCry was a warning shot to the global information community. Yes, we should all be concerned by the potential to exploit . . . highly sophisticated code to benefit a nation-state, or bad actors around the world.” She adds, “[T]he other glaring issue is that many large organizations were given the ability to ‘fix’ the vulnerability in March, which the virus exploits on Windows known as EternalBlue, but these organizations did not perform the update, which led to this large scale and tragic user error situation.” Dr. Stacey concludes that “the effects [of WannaCry] were mild compared to what is to come in the future.”

Professor Maximiliano Korstanje associate professor at the University of Palermo and Dr. Michelle Moore, adjunct professor at George Mason University with over 20 years in the cyber security industry both seem to share this ominous sentiment.

Prof. Korstanje: “WannaCry ransomware is a real threat for cyber-security. [Cyber] terrorism will be intensified in the decades to come.”

Dr. Moore: “This attack was ultimately inevitable.” Dr. Moore further elaborates, “ . . . incidents like WannaCry are just the tip of the iceberg . . . If we make ourselves vulnerable then we will be exploited. Being aware of these vulnerabilities and acting upon them is our best defense but being proactive instead of reactive will only make us stronger.”

With these predictions that cyber terrorism will continue to increase over the next few years, is it possible for the consumer to follow Dr. Moore’s advice of proactivity?

“The first thing is to be well protected against external threats,” Professor Korstanje advises. “This can be achieved by spending money on sophisticated anti-virus software.”

Dr. Moore agrees, adding, “The most important thing is to ensure you always update/download the latest patches when they come out, don't wait. There will always be hackers and malware out there to exploit anything showing vulnerability so it is important to be cognizant on security updates and staying alert.”

But the user must be wary of more than just suspicious emails.

“[A]void any insecure webpage which may transmit viruses or malware,” urges Professor Korstanje, while adding the always important recommendation to “regularly backup copies of all your work on pen drives or other devices.”

It appears everybody who uses a technological device now is aware of the general security tips to protect valuable personal information and the experts agree that following these best practices is essential for protecting data. From creating strong and ever-changing passwords, to downloading and continuously updating anti-virus and malware software, consumers have been taught and are employing the basics. But is that enough? “I think that we as a digital society have opted into this ‘cloud-based culture' where no data is really private, and is only as secure as the platform being used,” Dr. Stacey explains. “The basics, (changing passwords often, investing in encryption, back-up data on a personal hard drive) are fine but the very first thing that one should do before opting in, is to READ, DIGEST, and COMPREHEND the terms of service that we are blindly agreeing to.”

Dr. Stacey’s suggestion to read the fine print may seem cumbersome in today’s fast-paced society, where even taking the time to fill out a form can be considered inconvenient. Yet, if understanding where the information is being shared and with whom prevents stolen information, perhaps it is time we slow down and start asking questions.

“Companies are not hiding what they intend to do with your data,” Dr. Stacey concludes, “the burden is on us (the consumer) to truly understand what this means for us in our everyday lives.”

A sincere thanks to Dr. Michelle Moore, Dr. Emily Stacey, and Professor Maximiliano Korstanje for sharing their thoughts on the WannaCry attack. For more information on the topic of cybersecurity and threats, please take the time to review the related publications below:


Newsroom Contact
Elizabeth Leber
Promotions Assistant
eleber@igi-global.com
(717) 533-8845, ext. 132
www.igi-global.com/
Browse for more posts in:
Security and ForensicsCyber BehaviorCyber Warfare & TerrorismDigital Crime & ForensicsInformation Security & Privacy

No comments Comments

Log in or sign up to comment.
Be the first to comment!

More from IGI Global

Microplastics, tiny particles from degraded plastic waste, contaminate oceans, rivers, and drinking water, posing significant environmental and health risks. Current filtration methods are inefficient, costly, or environmentally harmful...
IGI GlobalRead More
Given the continuous increase in oil prices, it is curcial for governments worldwide to enact policies aimed at safeguarding the global economy. Government intervention is pivotal in handling the economic impacts of oil price fluctuations in economies heavily reliant on oil. To gain deeper insights into this global issue, let us talk to Nigar Islamli, the author of the book chapter, "Global Oil Price Shocks and Sustainability: The Case of Post-Soviet Resources-Rich Countries." Islamli will share her expertise and perspectives on economics, global resources, and social responsibility.
IGI GlobalRead More
Business and ManagementEnvironmental, Agricultural, and Physical SciencesGovernment and LawGlobal Business
Innovation never stops in the world of coatings and surface treatments. Engineers are constantly refining techniques to combat tribological damage, ensuring superior wear resistance and optimal lubrication in every application. Whether it's manufacturing, bio implants, machinery, or harsh environments, understanding tribology is crucial.
IGI GlobalRead More
Environmental, Agricultural, and Physical SciencesMaterials ScienceBooks & E-BooksInterview
Cybersecurity experts are quickly realizing that many of the methods used for combatting cyber threats are actually causing attackers to become even more sophisticated, further complicating the issue. This research highlights the need for further innovation to keep cyber defense methods relevant and effective for software systems.
IGI GlobalRead More
Computer Science and Information TechnologyCyber BehaviorComputer Engineering
NASA astronauts stranded in the International Space Station for months due to serious SpaceX rocket malfunction.
IGI GlobalRead More
Computer Science and Information TechnologyScience & EngineeringArtificial IntelligenceAerospace EngineeringBooks & E-Books
In a recent Q&A, Dr. Strehovec discussed his motivations for publishing this research and its potential to influence these diverse fields.
IGI GlobalRead More
EducationBooks & E-Books
Medha Sateesh Bharadwaj, the author of the book chapter "Regulatory Insights in Digital Health." Medha will share her expertise and perspectives on navigating the regulatory landscape in digital health.
IGI GlobalRead More
Medical, Healthcare, and Life SciencesHealthcare Information SystemsBooks & E-BooksChapters
Researchers uncover a potential treatment to delay the worst effects of Alzheimer's disease.
IGI GlobalRead More
Medical, Healthcare, and Life SciencesScience & EngineeringBiomedical TechnologiesBooks & E-Books
There is a growing issue in the research community of authors submitting their articles to gold OA journals (and even hybrid OA/subscription-based journals), and then withdrawing their article after it has been accepted to the journal, effectively utilizing all of the resources of that journal, including the peer review, only to then refuse to publish at the end of the process.
Erin WatsonRead More
NewsletterAuthor NewsOpen Access
First Previous 1 2 3 4 5 6 7 8 9 10  ... Next Last