CIS 333 Network Security Fundamentals
July 23, 2014
We have been tasked by the CIO to draft a report identifying potentially malicious attacks, threats, and vulnerabilities specific to our organization. Further, the CIO would like us to briefly explain each item and potential impact it could have on the organization.
Malicious Network Attacks
"Network attack is usually defined as an intrusion on your network infrastructure that will first analyze your environment and collect information in order to exploit the existing open ports or vulnerabilities - this may include as well unauthorized access to your resources" (Symantec, 2013). We will first have to analyze the potential attacks we need to protect against, and the potential impact those attacks could have on the network. The majority of threats we will encounter are classified as viruses, hacks, and blended attacks.
1. Viruses. "A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet)." (Symantec, 2013). Due to the shear frequency of virus attacks, we shall list them number one. According to a Department of Trade and Industry (DTI) survey, 72% of all companies received infected e-mails or files last year and for larger companies this rose to 83% (Vernon, 2004). The potential impact of the network becoming infected with a virus could be devastating. File destruction, file corruption, disabling user programs, loss of critical data and overloading the network are just a few of the potential impacts of a virus. Viruses can be introduced in to the network in many ways. Employees downloading /using unauthorized programs, opening and executing infected email attachments, bringing infected files from home on a thumb drive or CD, accessing the network with their smart phone,
Cited: Gale, S. F. (2013, April 2). BYOD Brings Security Risks for Companies. Retrieved July 14, 2014, from workforce: http://www.workforce.com/articles/byod-brings-security-risks-for-companies Lawson, A. (2014, May 23). Businesses need to wake up and smell the hackers. Retrieved July 23, 2014, from The Independent: http://www.independent.co.uk/news/business/analysis-and-features/businesses-need-to-wake-up-and-smell-the-hackers-9422300.html Piscitello, D. (n.d.). What is a blended threat? Retrieved July 23, 2014, from The Security Skeptic: http://securityskeptic.typepad.com/the-security-skeptic/what-is-a-blended-threat.html SupportSoft. (2005, March). By the Stats: The Impact of Computer Virus Attacks on Business. Retrieved July 23, 2014, from Retail Online Integration: http://www.retailonlineintegration.com/article/by-stats-the-impact-computer-virus-attacks-business-51445/1 Symantec. (2013, December 27). Security 1:1 - Part 3 - Various types of network attacks. Retrieved July 23, 2014, from Symantec: http://www.symantec.com/connect/articles/security-11-part-3-various-types-network-attacks Vernon, M. (2004, April). Top five threats. Retrieved July 23, 2014, from Computer Weekly: http://www.computerweekly.com/feature/Top-five-threats