Describe some actions or techniques that can be used to mitigate or stop the impacts of malicious applications. Are some of these methods more effective than others? Provide an example of a cyber attack that resulted from the execution of malicious code. There are plenty of examples that can be queried from the Internet.
There are multiple ways to help prevent or mitigate malware attacks. For example, having anti-virus software, encryption, and firewalls create strong barriers for malware to go through. Intrusion detection systems, intrusion prevention systems, and ensuring that a system is patched and updated are more methods for keeping a system secure before an attack can happen. Outside of software, having an effective security policy, and having employees understand a basic foundation of cybersecurity through training also mitigate the potential for attacks. Enabling two-factor authentication and a strong password policy can also mitigate the potential for further damage if an attack happens. While all of these methods and techniques range in their effectiveness depending on the situation, a structured layering of them creates a very strong barrier of security for malicious attacks to break.
However, even with layers of security, some attacks still manage to get through in different ways. An example of this was the 2020 SolarWinds supply chain attack. The hackers managed to get in not by targeting SolarWinds’ network directly but through a third-party supplier’s network, which then allowed them to inject malicious code into their update, and when that update was sent out, it led to thousands of users being compromised, and the potential for further spread. The attack was an example of how all sectors and ties to a business need efficient layers of security to prevent large cyber-attacks.
https://www.fortinet.com/resources/cyberglossary/solarwinds-cyber-attack