Preview

Isc342 Unit 2 Research Paper

Satisfactory Essays
Open Document
Open Document
488 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Isc342 Unit 2 Research Paper
ISSC342
Week 1 Assignment
American Military University

1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.
As our society realize more and more on technology like computers and smart phones to conduct every day things such as banking, work, school, and staying connected with family and friends, our personal information has become more vulnerable to attack. Before computers, if someone wants to steal your personal information they would need to break in to your house, work and car to try and get your information. Now everything about us are stored right on our computers from banking information, to medical information. Some of the most common forms of attack on Microsoft system are Trojan horse, backdoor, denial of service, robot/intermediary process, unprotected
…show more content…
Denial of services is an attack on networks that are intended at making computer or particular service on a computer unavailable.
Robot/intermediary process is a form of attack that is lunched on one computer but attacks another computer.
Unprotected Windows Share is an easy method of allowing remote access or sharing to computers. This type of attack is commonly used with shared folder and printers.
Mobile code refers to interpreted or executable content that can be downloaded and run on a user’s computer. This type of attack offers the user visiting the site a method that’s provide a rich and dynamic content to users.
Cross-site scripting is a type of computer security exposure found in web function such as XSS which attacker attach to the client side of a script.
Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The goal of an XSS attack is to gain administrator or some other elevated level of user privileges.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Manual/ White Box: In this technique, a thorough code review is performed over the whole code, which may become a very tedious and tiresome process. But in this process, logical flaws may be identified which may not be possible using automated tools, such as business logic problems. Automated tools are mostly capable of finding technical flaws such as injection attacks but may miss flaws like authorization problems. In this process, instead of going line by line through whole code base, we can concentrate on potential problems in the code. Those potential vulnerabilities can be given a high priority. For example, in C/C++, if we try to find any copying function in the code and check whether it’s using functions such as, strcpy() for performing copy function. As we know, strcpy() is known to be vulnerable to buffer overflow attacks. We may also want to check if any customized encryption is being used in the application, which automated tools may miss as they can identify standard algorithms only…

    • 813 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    A(n) ____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    * Messages often contain attachments that exploit weaknesses in client-side applications, or links to websites that exploit vulnerabilities in Web browsers or browser plug-ins.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC362 Lab 4 Assessment

    • 412 Words
    • 2 Pages

    Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    ____ occurs when an attacker intercepts packets with encrypted data and changes the destination address to forward the packets to a different destination on the Internet.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    To begin one of the most basic types of possible threats can come from what is called an IP sweep. What an IP sweep basically is a broad area ping that allows the user to determine what hosts if any exist on a network given a certain IP address range. A normal ping consists of a single hello message from one computer to the receiving computer. A ping sweep pings any and all computer to determine which are alive so that the attacker can figure out where he can attack the network.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A general term for software that is designed to destroy or disrupt data or do other unwanted actions in a computer system.…

    • 1399 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    In real world scenario, a Denial-of-Service attack DoS attack) or Distributed Denial-of-Service attack (DDoS attack) is an effort to make a machine or network resource unavailable to its genuine users. Although the means to carry out, motives for, and objective of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or eliminate services of a host connected to the internet. One common method of attack involves saturating the target machine with outside communications requests, so much so that it cannot respond to legitimate traffic or responds so lowly as to be rendered essentially unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are carried out by either…

    • 286 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Spoofing Facts

    • 433 Words
    • 2 Pages

    Spoofing is used to hide the true source of packets or redirect traffic to another location. Spoofing attacks:…

    • 433 Words
    • 2 Pages
    Good Essays
  • Good Essays

    As cyber-attacks related to information warfare have increased throughout the twenty first century we have seen a rise the use of cyber-attacks by nation states. These nation state attackers focus on targeting other nations in the hope of disrupting the nation’s economy, causing public panic, or crippling a country defenses along with many other goals which damage a nation. These attacks in turn allow the nation state which performed the attack to weaken the other nation, make political statement, steal nation’s information or resource, or use the attacks as a greater warfare plan. This often raises the question when discussing nation state cyber-attacks…

    • 843 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities. Explain to your CIO what you can do to make sure the network infrastructure is more secure.…

    • 732 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Electronic Crime

    • 3971 Words
    • 13 Pages

    There are four parts of cybercrime attack that got to be discussed in this assignment. These included Distributed Denial of Services, identity theft, social engineering and man-in-the middle attack. A topic that will be covered is type of vulnerability, type of attack, the impact of those attack and protection mechanism used to prevent attacks to happen.…

    • 3971 Words
    • 13 Pages
    Better Essays