Preview

Nt1330 Unit 1 Essay

Better Essays
Open Document
Open Document
601 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 1 Essay
Unit 1 Assignment 1:
Developments in Hacking, Cybercrime, and Malware
ITT Technical Institute

The number one web based attack of 2009 was Malicious PDF activity 49% of web based attacks--attempts to deliver malicious pdf content to victims through the web. The pdf attack is designed to exploit arbitrary vulnerabilities in applications that are able to process pdf’s. A successful pdf attack could compromise the integrity and security of affected computers. (Symantec Corporation, 2009)

The number two web based attack of 2009 was the Microsoft Internet Explorer ADODB.Stream Object file installation weakness. This exploit accounted for 18% of the total number of web based exploits for the year.This vulnerability allows hackers to install malicious files on a vulnerable computer when a user visits a website hosting an exploit. In
…show more content…

This attack works by enticing a victim to open a malicious web page. Once a user opens the web page it gives the attacker the ability to execute remote code on the victims computer. Since this is a browser based attack, it gives the hacker potentially more targets than relying on a plugin that may not get installed. (Symantec Corporation, …show more content…

What makes the W32.Sality particularly nasty is that it can infect executable files on local, removable, and shared drives. W32.Sality is known as an (EPO) or entry point obscuring polymorphic file infector. Essentially, it’s a sophisticate worm-like virus that ensures its survival by downloading other malware and disabling security software. One of the most damaging features of the W32.Sality virus is how it decentralizes peer to peer networks with sophisticated code instruction that populates the network with infected computers. (W32.Sality.,

You May Also Find These Documents Helpful

  • Good Essays

    The goal of an XSS attack is to gain administrator or some other elevated level of user privileges.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 6 Essay

    • 308 Words
    • 2 Pages

    Multiply the mass of each isotope by its natural abundance, expressed as a decimal, and then add the products.…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Essay

    • 604 Words
    • 3 Pages

    I believe that the importance of correct programming and setting up of part is very important in today’s CNC manufacturing world as you are producing very precise components that need to be produced first time, every time or this is bad news for the company because of loss profits, scrap material and expensive repair costs. So ensuring correct programming and setting up of CNC machines is critical.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Solution: This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.…

    • 272 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 4 Essay

    • 1197 Words
    • 5 Pages

    Complete the necessary documentation relating to customer problems and solutions Unit 2.4Describe the types of information customers require in Resort Unit 2 2.1…

    • 1197 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    In this lab, you will verify and perform a cross-site scripting (XSS) exploit and an SQL injection attack on the test bed Web application and Web server using the Damn Vulnerable Web Application (DVWA) found on the TargetUbuntu01 Linux VM server. You will use a Web browser and some simple command strings to identify the IP target host and its known vulnerabilities and exploits, and then attack the Web application and Web server using cross-site scripting (XSS) and an SQL injection to exploit the sample Web application running on that server.…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 7 Essay

    • 301 Words
    • 2 Pages

    Do we really need a major change in the way the IS function is structured...are the necessary changes just minor modifications to accommodate normal growth in computer uses...what are your thoughts / research in this regard.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    d. Advisory # 2755801 – Update for vulnerabilities in Adobe flash player in Internet Explorer.…

    • 537 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1330 Unit 2 Term Paper

    • 356 Words
    • 2 Pages

    1. Developing resilient community health workers who have the competences and resources to meet the health needs of under-served communities.…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. Learning is defined as “the process of acquiring through experience new and relatively enduring Information or behaviors.”…

    • 843 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    When a computer get infected with this virus, the computer screen will be flooded with various unexpected advertisements which can prevent a user from surfing on the Internet normally.The group of hackers created this adware to earn quick money by creating online traffic through which they can generate pay-per-click and marketing revenue.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    A reflective attack a type of computer security vulnerability it involves the web application dynamically generating a response using non-sanitized data from the client scripts, like Java scripts or VB script, in the data sent to the server will send back a page with the script…

    • 486 Words
    • 2 Pages
    Good Essays