Preview

ISSC362 Outline Shanee Gamliel

Satisfactory Essays
Open Document
Open Document
680 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ISSC362 Outline Shanee Gamliel
Cyber Attacks: Changing the Future of Cyber Security
Shanee Gamliel
ISSC362: IT Security: Attack & Defense
Adam Meyer
26 April 2015

I. INTRODUCTION
a. Thesis
i. Cyber-attacks have changed the future of cyber security.
b. Cyber Security
i. Reasons networks need cyber security more than ever
1. Types of attacks
2. Vulnerability of a company’s network
3. How cyber security protects a company’s network
c. Introduction of cyber-attacks that will be discussed.
i. The Melissa Virus (1999) ii. I LOVE YOU Virus (2000) iii. Stuxnet (2010) iv. Attack on Sony (2011 & 2014)
II. TECHNOLOGY USED FOR CYBER ATTACKS
a. Techniques used for cyber attacks
i. Port scanning
1. What is Port Scanning
2. How does an attacker use open ports to attack a network
3. Software ii. Phishing
1. What is Phishing
2. How does it target users iii. Worms and Viruses
1. How they differ from on another
2. Why are Worms dangerous to a network iv. DDOS Attacks
1. What is a DDOS attack
2. Ways to create a DDOS attack
III. HOW THESE ADVANCED ATTACKS CHANGED SECURITY NEEDS
a. The Melissa Virus (1999)
i. Introduced dangers of the macro virus ii. Email security iii. Utilization of virus scanners
b. The I LOVE YOU Virus (2000)
i. Introduced dangers of Worms and DDoS attacks ii. Email security and targeting iii. Updating of anti-virus and anti-malware software
c. Stuxnet Worm (2010)
i. Introduced possibilities of cyber warfare
1. Cyber-attacks now being used as a weapon ii. Foreign government and political affairs
1. Need for new cyber policies
2. What is and what isn’t ethical
d. Attack on Sony (2011 & 2014)
i. Introduces vulnerabilities to large corporations
1. Port scanning ii. Created a visual that even now cyber security needs to be taken seriously iii. Effects of leaking sensitive information
IV. GLOBAL IMPLICATIONS AND FUTURE TRENDS
a. Global Implications
1. Cyber security as a nationwide issue
a. President Obama addressed the importance of Cyber security after the Sony attack



References: Chen, T., & Abu-Nimeh, S. (2011). Lessons from Stuxnet. Computer, 44(4), 91-93. Retrieved April 30, 2015, from http://ieeexplore.ieee.org.ezproxy1.apus.edu/stamp/stamp.jsp?tp=&arnumber=5742014& isnumber=5741994 Greenwald, J. (2015). SONY ATTACK RECASTS CYBER SECURITY DEBATE. Business Insurance, 49(2), 1-n/a. Retrieved from http://search.proquest.com/docview/1647431191?accountid=8289 iRiS Software Protects Users From the Melissa Virus; iRiS Customers Were Protected Before Media Reports Emerged. PR Newswire, Retrieved from www.lexisnexis.com/hottopics/lnacademic MacSweeney, G. (2000). When "I love you" isn 't so sweet. Insurance & Technology, 25(7), 7. Retrieved from http://search.proquest.com/docview/229285360?accountid=8289 Obama, B. (Director) (2015, February 13). Remarks by the President. Cybersecurity and Consumer Protection Summit. Lecture conducted from The White House, Stanford, California. https://www.whitehouse.gov/the-press-office/2015/02/13/remarks-president- cybersecurity-and-consumer-protection-summit Sicard, S. (2015). North korean cyber attack on sony poses tough security questions. National Defense, 99(736), 24-25. Retrieved from http://search.proquest.com/docview/1664028918?accountid=8289 Stateman, A. (2000). Love at first byte: "I love you" virus bugs PR pros. Public Relations Tactics, 7(7), 1-1,4. Retrieved from http://search.proquest.com/docview/205085506?accountid=8289 Thibodeau, P. (1999). The melissa virus lesson: Quicker reactioneeded.  Computerworld, 33(17), 25. Retrieved from http://search.proquest.com/docview/216056378?accountid=8289 Tweedie, S. (2015, March 20). White House hires Facebook engineering director as its new director of information technology. Retrieved April 30, 2015, from http://www.businessinsider.com/facebook-engineering-director-hired-by-white-house- 2015-3 Zetter, K. (2013, 05). Stuxnet. Wired, 21, 139. Retrieved from http://search.proquest.com/docview/1411852095?accountid=8289

You May Also Find These Documents Helpful

  • Good Essays

    Cis11 Assessment 1

    • 1390 Words
    • 6 Pages

    Safety Styles Pty Ltd has demonstrated in is able to generate and increase its profits as demonstrated through the healthy Gross and Net Profit Margins.…

    • 1390 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    2. If your firm has plenty of client references and experience in performing the Scope of Work but lacks the minimum vendor qualifications what should you consider?…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    1. Which tool is better at performing protocol captures and which tool is better at performing protocol analysis?…

    • 696 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Isqc 36 Study Guide

    • 4177 Words
    • 17 Pages

    ISQC 1 36 INTERNATIONAL STANDARD ON QUALITY CONTROL 1 QUALITY CONTROL FOR FIRMS THAT PERFORM AUDITS AND REVIEWS OF FINANCIAL STATEMENTS, AND OTHER ASSURANCE AND RELATED SERVICES ENGAGEMENTS (Effective as of December 15, 2009) CONTENTS Paragraph Introduction Scope of this ISQC ................................................................................. 1−3 Authority of this ISQC ............................................................................ 4−9…

    • 4177 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    (1)What does Dahl mean by “Ideal Democracy” in Part 1 of his book “On Democracy”?Define and summarize Dahl’s more significant points.…

    • 752 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    IS3230 Final Exam Answers

    • 939 Words
    • 4 Pages

    6. Which of the following should be considered while implementing a layered access security approach?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Isys 100 Research Paper

    • 2116 Words
    • 9 Pages

    3) When you hear the term “making IT eco-friendly”, explain how this is related to Information Technology and the environment.…

    • 2116 Words
    • 9 Pages
    Good Essays
  • Good Essays

    In her article “The Six Stages of E-Mail”, Ephron makes use of a very unorthodox writing style to share her experience of email. She splits her article into six stages, starting very enthusiastically and gradually devolving into a state of despondency. At first, the endless flow of emails provided Ephrom with a false sense of popularity, but soon, she realized this illusion of friendship was wrecking both her social life and her professional life. Ephron is able to tell this story of infatuation and indifference with a sense of humor that transforms it from a dull and overdone article into a whimsical gag.…

    • 228 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Isllc Standard 2

    • 293 Words
    • 2 Pages

    Big Ideas/Enduring Understandings: Represent the main ideas, conclusions, or generalizations about the “unwrapped” concepts and skills in a focused instructional unit of study. Ask yourself: “What do is the big idea of the standard? What do I want my staff to remember long after they leave the…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Bradshaw Essay

    • 1854 Words
    • 5 Pages

    Chapman, Gary D. The Five Love Languages: How to Express Heartfelt Commitment to Your Mate. [New ed. Chicago: Northfield Pub., 1995. Print.…

    • 1854 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Arguments Against Kaplan

    • 940 Words
    • 4 Pages

    Robert Kaplan makes a compelling argument in his book, “The Coming Anarchy,” that global environmental and social factors such as resource depletion, overpopulation, crime, and tribalism are the most pressing national security issues in the 21st century. He cites numerous examples of crime, war, and destitution in failing states of West Africa as well as protracted conflicts in the Balkans, and Central Asia. However, the environmental and social factors described by Kaplan are not security threats, per se, rather the fertile ground from which security threats arise. Resource depletion, overpopulation, tribalism, or combinations thereof are not sufficient conditions for security threats. Kaplan himself makes perhaps the best argument for this in his description of the Turkish culture and the people of a shanty town called Golden Mountain. Despite having many unfavorable…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The improvements being done in technology touted to make lives and work easier also makes it easier for cyber-criminals to perform his or her nefarious deeds. Some of the most vulnerable and potentially damaging targets are critical infrastructures such as the energy grid and nuclear-power plants. To help combat this, the U.S. Government is launching a program dubbed “Perfect Citizen” to help safeguard those critical infrastructures as well as private companies. In this paper I will discuss the Wall Street Journal article on the Perfect Citizen project posted on the Wall Street Journal website.…

    • 816 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Answer: because cyberwarfare is more complex than conventional warfare. Cyberwarfare is Internet based conflict that involves political motivated attacks on information systems. Cyberwarfare attacks are disabling financial systems and communication networks. This is a serious problem because the potential targets for these attacks are military power grids but this cyberwarfare is targeting MNC, technology firms, and news organizations. This causes Obama (who is the official first cyberwarfare president) to not only worry about who is attacking his military but who is attacking and targeting his country.…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITC term paper

    • 340 Words
    • 1 Page

    Information system is no doubt very dependent in our daily life. Without information system, Maxis as well as other organizations will not be able to further advance their business. This is because information system deals with data much faster. For Maxis, information system is used to check back everything about their business whether in terms of billing, customer services or others. Information system also helps Maxis to organize and keep track of previous transactions. This is very important and essential because customers cash are at risk. Maxis charges customer for service that is unable to be seen which is communication. Therefore, Maxis must always be in control and able to inform customers what they are being charged for. So, Maxis uses management information system (MIS) to clarify all their transactions and operations. As one of the top telecommunication organizations in Malaysia, Maxis has to keep up in terms of social skills. To achieve this, Maxis uses a communication and collaboration system which enables them to communicate more effectively between workers, partners, customers and suppliers to enhance their ability to collaborate. For example, Maxis enabled a live chat function in order to communicate with their curious customers at any time. Furthermore, proudly being one of the top in the telecommunication business, there must be a reason for the success that Maxis is able to achieve. A part of Maxis's success should be credited to their workers of course. However, it all comes back to the information system that allow workers to achieve such productivity. In other words, Maxis uses an office automation system that supports the wide range of business office activities that provide for improved work flow between workers. Thus, contributing to Maxis's success today. Information system has definitely helped Maxis advance their business in general. It is almost to the extent where Maxis rely on information systems to make their organization succeed.…

    • 340 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Bibliography: Cable News Network.(2011). Public affection: How much is too much? retrieved October 7, 2011, From: http://articles.com/2007-09-27/living/public.dispaly_1_aids-awareness-event-kiss-bollywood-actress-shilpa-shell?_s=PM:LIVING…

    • 9119 Words
    • 37 Pages
    Powerful Essays