Preview

IS4560 Unit 1 Assignment 1

Satisfactory Essays
Open Document
Open Document
275 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS4560 Unit 1 Assignment 1
Randy Murphy
IS4560
Unit 1 Assignment 1

In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:
* Malicious code activity
* Tends to increase in countries experiencing rapid growth in broadband infrastructure and connectivity, , readily available malicious code kits are making it simple for attackers to mount attacks, the online underground economy and malicious activity are benefiting from the downturn in the global economy.
* Web-based targeted attacks on enterprises are increasing
* Targeted attacks using advanced persistent threats (APT )
* Designed to remain undetected in order to gather information over prolonged periods. This type of attack has been observed in other large-scale data breaches that caused large numbers of identities to be exposed
* Hacking attack using an SQL-injection attack
* The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.
* Researching publically available information about a company or its employees
* Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.
* Messages often contain attachments that exploit weaknesses in client-side applications, or links to websites that exploit vulnerabilities in Web browsers or browser plug-ins.
* A successful attack could give the attacker access to a company’s network.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mail may have confidential information. It may contain personal information about employees or contain business secrets such as names and other personal details of customers.…

    • 2175 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996. The main purpose of this law was to improve the flow of health information. At this time, the great majority of the records were still in paper form, however there was a push for the healthcare industry to become digital. Prior to 1996, the only federal law that regulated the privacy of health information was the Privacy Act of 1974. Between 2003 and 2005, there were more than 13,000 privacy complaints, but no civil enforcement actions were brought by the HHS Office for Civil Rights (OCR). In that same period, there was only one HIPAA criminal action, against a lab assistant who used the personal data of a terminal cancer patient for identity theft. By 2008, 33,000 + complaints had been filed with OCR, only about 8,000 were investigated with 5,600 leading to corrective action, yet no fines had been issued. Several key dates for HIPAA since then are: February 17, 2009- ARRAs HITECH Act Signed into Law. HIPAA revised to strengthen enforcement penalties, require breach notifications, and expand patient rights 2009OCR increases HIPAA Enforcement January 25, 2013- HITECHs HIPAA Modification Final Rule Release There is no single part of the HIPAA complaint form that should be singled out for attention, other than simplifying the form completion instructions. In the situation where every instructor Brandon ford Mr. Redmond 1-14-2015 IS3350 and all associated staff had access to the students health care records, Premier College is in direct violation of HIPAA.…

    • 253 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Is3350 Unit 2 Assignment

    • 1380 Words
    • 6 Pages

    Introductions: All three of my subjects are females that I have known for at least 5 years. Two of the subjects (1 and 2) are mother and daughter. The mother and daughter were asked in a group setting with 11 questions I had a lot of questions because I wasn’t sure of what my younger subject would be able to answer. Everybody was asked the same questions. Since I knew my subjects I just called and seen whether they would be willing to answer some questions. They all agree so I did the mother and daughter on September 15 on a Tuesday, and my third subject was September 16 on a Wednesday. I drove to their house and I spent about 3 hours with subject 1 and 2, and I spent 2 hours with subject 3. Subject 1 and 2 was questioned in subject 1 bedroom…

    • 1380 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Using software to guess company addresses and send them blank e-mails. Unreturned messages are valid addresses that are added to spammer e-mail lists.…

    • 1096 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Ethical Computer Hacking

    • 1026 Words
    • 5 Pages

    There are a many types of hacks, and hackers in the cyber world. A hack can be any modification done to virtually anything, to make it do something better, or something completely different. Many hackers are hackers of electronic equipment, mostly computers, but even cell phones, routers, iPods, digital cameras, and even the Toyota Prius have been hacked to get better gas mileage with the hybrid-electric engine (Rupley). But besides modifying computers themselves or gadgets, hackers play a significant role in the networking world.…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Besides the cultures in countries being targets for these attacks, the industry sees a large amount of these attacks as well (See figure below). It is because of these trends, that cyber terrorism is a growing concern.…

    • 2129 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Email Security

    • 752 Words
    • 4 Pages

    Email security threats may be of many different types. Email security can be compromised by spoofing, identity theft, attacks by modifying existing messages, and imposters [Kangas, 2004]. Hackers may use any or all of these methods to break into a user's computer.…

    • 752 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    (see Exhibit 2-1). The endpoint can only view the last proxy with which it is directly communicating and not any of the intermediary proxies or the original location.…

    • 1647 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Hacking and Cybercrime

    • 730 Words
    • 3 Pages

    The Symantec Global Internet Security Threat Report noted a shift in malicious activity to be emerging. The growing level of malicious code activity has also resulted in the proposal of a new cybercrime bill. Malicious activity tends to increase in rapid growth in broadband infrastructure and connectivity. In January 2010, reports emerged that dozens of large companies had been compromised by attackers using the Hydra Trojan. Typically, this type of attack begins with some reconnaissance on the part of attackers. Typically, this type of attack begins with some reconnaissance on the part of attackers. This can include publicly available information about the company and its employees, such as from social networking sites. This information is then used to create specifically crafted phishing email messages, often referred to as spear phishing, that target the company or even specific staff members. These email messages often contain attachments that exploit vulnerabilities in client-side application or links to websites that exploit vulnerabilities in web browsers or browser plug-ins. In 2009, 60 percent of identities exposed were compromised by hacking attacks. Which are another form of targeted attack. The hackers gained access to the company payment processing network using an SQL injection attack. The attackers then installed malicious code design to gather sensitive information from the network, which allowed them to easily access the network at their convenience. The attacks resulted in the theft of approximately 130 million credit card numbers. Web-based attacks have replaced the mass mailing worm in this position. Attackers may use social engineering, such as in spam messages, to lure a user to a website that exploit browser and plug-in vulnerabilities. These attacks are then used to install malicious code or other applications such as rogue security software on the victim’s computer. Four of the top five…

    • 730 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Virus hunters

    • 809 Words
    • 4 Pages

    if your market shifted 30 times a day. The computervirus hunters at Symantec Corp. don’t have to…

    • 809 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    This kind of activity refers to sending large numbers of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing.…

    • 3472 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    waste disposal

    • 7404 Words
    • 24 Pages

    There is no disputing the facts... the number of hacking and intrusion incidents is increasing year on year as technology rolls out. Unfortunately in todays inter-connected e-commerce world there is no hiding place: you can be found through a wide variety of means: DNS, Name Server Lookup, NSlookup, Newsgroups, web site trawling, e-mail properties and so on.…

    • 7404 Words
    • 24 Pages
    Powerful Essays