Preview

Cmgt/441 Week 3 Individual Assignment

Best Essays
Open Document
Open Document
1652 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt/441 Week 3 Individual Assignment
Week Three Individual Assignment CMGT/441 October 7, 2013

Attack Prevention: Preventing Cyber Attacks Technology is everywhere, which is evident in the everyday products that we as a society use such as computers, cell phones, global positioning devices, and the Internet. As technology expands and grows, so does the reliance and dependence on these types of products. But reliance and dependence are not the only things that technology brings. Cyber attacks are a gradually increasing occurrence that is derived from technology; however, stopping these types of attacks before they occur is usually more difficult than can be expected, but is overall not impossible. The trick to averting such an attack lies in the programs and applications that one uses for defense that recognizes, detects and notifies the user that an attack is imminent. This can be something as simple as a malware and/or virus program to something more complex such as a firewall. The purpose of this paper is to discuss what constitutes a cyber attack, examine the steps involved in a cyber attack, and determine how to prevent them, which was discussed in the article by Tony M. Damico entitled Cyber Attack Prevention for the Home User: How to Prevent a Cyber Attack (2009) and other sources.
Cyber Attack: What It Is A cyber attack, also known as Cyber Warfare, is “an attempt to undermine or compromise the function of a computer-based system, or an attempt to track the online movements of individuals without their permission” (WiseGeek, 2011). To put it in simpler terms, a cyber attack is the targeting of something electronic to make them malfunction so that some type of reward can be collected. As mentioned in the first definition, cyber attacks fall into two basic categories: those acts that are intended to collect information and those that are intended to do harm. Cyber attacks that are specifically carried out for the sole purpose of



References: Apollo Group (2006). Kudler Fine Foods History. Retrieved November 28, 2009, from https:// ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Kudler/KudlerHomes002.htm. Damico, T. M. (2010, November 13). Cyber Attack Prevention for the Home User: How to Prevent a Cyber Attack. Student Pulse website. Mah, P. (2010). The Anatomy of a Cyber Attack, Part 1. Retrieved January 15, 2011, from http://itbusinessedge.com/cm/blogs/mah/the-anatomy-of-a-cyber-attack-part-1/?cs=3. Mah, P. (2010). The Anatomy of a Cyber Attack, Part 2. Retrieved January 15, 2011, from http://itbusinessedge.com/cm/blogs/mah/the-anatomy-of-a-cyber-attack-part-2/?cs=3. Radenhausen, J. (n.d.). Ways to Prevent Cyber Identity Theft. Retrieved January 14, 2011, from http://www.ehow.com/print/way_5676604_ways-prevent-cyber-identity-theft.html. SANS (2009). Top Cyber Security Risks – Tutorial: HTTP Client-Side Exploit. Retrieved January 11, 2011, from http://www.sans.org/top-cyber-security-risks/tutorial.php. Waslik, D. & Teixeira, R. (2011). Five Ways Small Businesses Can Combat Cyber Crime. Retrieved January 13, 2011, from http://www.startupnation.com/NET_ROOT/print_ template/PrintContent.aspx?content_id=.

You May Also Find These Documents Helpful

  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Better Essays

    [Company] has been contracted to conduct a penetration test against [Organization] external web presence. The…

    • 1355 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    For students, the main threat comes from identity theft, often a result of inappropriate practices connected to social media and email attacks. Often, attacks to a college network occur because of unintentional and misguided errors from students.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    A computer security manager must have knowledge of the latest computer and network policies, patches, and have good technical experience with many types of hardware and software products, superior communication skills, and willingness to learn and update skills, and a knack for problem solving skills.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays