Preview

Assignment 1 Malicious Attacks Threats And Vunerabilities

Better Essays
Open Document
Open Document
983 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment 1 Malicious Attacks Threats And Vunerabilities
Assignment 1- Identifying Potential Malicious Attacks, Threats and Vulnerabilities
Larry F. Simmons
Strayer University Online
Professor Arend Clayborn
February 4, 2015

A malicious attack can be any physical or electronic action taken with the intent of acquiring, destroying, modifying, or accessing a user’s data without permission of their files. Hackers attempt to gain access to information about your system which can reveal many common exploits and other vulnerabilities of your system. Hackers pursue their attacks using the information that is gathered from the system. Recently, Anthem which is one of the nation’s largest health insurers suffered a hacking into their computer system. The attack was detected on January 29th and are now working with the Federal Bureau of Investigation (FBI). The hackers concentrated mostly on Social Security numbers, birthdates, addresses, e-mail and some employment information and other data. Fortunately, credit card information and medical records (including doctor and hospital information) were not affected. Three types of potential malicious attacks are as follows:
1) Passive attacks
2) Active attacks, and
3) Insider attacks A passive attack is actually eavesdropping or monitoring of any transmission that is happening in the system. A passive attack can include an analysis of any traffic, the monitoring of unprotected communications, decrypting weakly encrypted traffic, and capturing authentication information such as passwords. Individuals can see any actions that are coming up in the system which would disclose information or data files that would be available to the attacker without the knowledge of the user. An active attack involves attempts to break through protection features such as a firewall. This can be done through stealth, viruses, worms or Trojan horses. Active attacks involve the introduction of malicious code and to steal or modify information. These attacks are

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    (1 point) 6. The first attack demonstrated on the Nittany Corp. network in the lab video is this kind of attack.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    If you have a credit card, pay off the balance each month. This prevents several penalties and late fees. It is best to use a credit card only for emergencies. Keep in mind that the reason you are going to college is to get an education. Debt can cause you to lose focus.…

    • 453 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are a number of techniques and processes available when carrying out a Passive Information Gathering exercise. A lot of important information can be passively harvested and subsequently used in a direct attack or to reinforce other attacks targeted at an organization. Depending upon the source, information such as current service patching levels, internal network…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    Vulnerability MS08-067 is an exposure in Server Service that could allow remote code execution in an affected system. The operating systems affected are Microsoft Windows 2000, Windows XP, and Windows Server 2003.…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Use the Web to research and evaluate security products from two competing vendors, such a...…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    1. A user made unauthorized use of network resources by attacking network entities. You are potentially sabotaged by an employee or employer.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Defense against web attacks is a key element in a security professional’s skill set. For this assignment, your manager has asked you to review the Aim Higher College’s Web server and application security and to suggest appropriate defenses. For each of the following scenarios, explain what the threat or threats are, what defenses you would recommend, and why.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Some risks that I have identified are social engineering techniques due to the excessive trust given to messages coming from friends, contacts or followed people within the OSN(Online-Social Network) identity theft and information leaking furthermore, spam sending and malware distribution through Social Networks are increasing at an incredible pace. They are not the only threats.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Assignment 26 Safeguarding

    • 4735 Words
    • 19 Pages

    Civil Law is in 2 areas Public Law which puts systems and processes to reduce the risk of children coming to harm and says what action should happen if they are at risk. Private Law sorts out family contact and divorce.…

    • 4735 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Anthem Syndrome

    • 340 Words
    • 2 Pages

    In 2015, Anthem has announced their biggest data breach yet, 80 million people were at risk in having their personal data exposed which may cause identity fraud. This was not the case in just losing a credit card it was much more personal because of the information it contained. Everyone’s social security numbers, previous health records, previous employees and previous address that is the biggest issue in this case. This was called “sophisticated attack” because someone has impersonated as administrator worker. This allows the thieves to go back in later and enter much sensitive information that is not for the public eye.…

    • 340 Words
    • 2 Pages
    Satisfactory Essays