Preview

Phases of a Computer Attack

Satisfactory Essays
Open Document
Open Document
284 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Phases of a Computer Attack
Unit 9 Assignment 1
Phase 1 - Reconnaissance
Reconnaissance uses a variety of sources to learn as much as possible about the target business and how it operates, including
• Internet searches
• Dumpster diving
• Domain name management/search services
• Non-intrusive network scanning
• Social engineering
Phase 2 - Scanning
Once you have enough information to understand how the target works and what information of value might be available, you begin the process of scanning perimeter and internal network devices looking for weaknesses, including
• Open ports
• Open services
• Make and model of each piece of LAN/WAN equipment
• Vulnerable applications, including operating systems
• Weak protection of data in transit

Phase 3 - Gaining Access
Gaining access to resources is the whole point of a modern-day attack. The usual goal is to either extract information of value to you or use the network as a launch site for attacks against other targets. In either situation, you must gain some level of access to one or more network devices.
Phase 4 - Maintaining Access
Having gained access, you must maintain access long enough to accomplish your objectives. Although you have reached this phase has successfully circumvented their security controls, this phase can increase your vulnerability to detection.
Phase 5 – Covering Tracks
After achieving your objectives, you typically takes steps to hide the intrusion and possible controls left behind for future visits. Again, in addition to anti-malware, personal firewalls, and host-based IPS solutions, deny business users local administrator access to desktops. Alert on any unusual activity, any activity not expected based on your knowledge of how the business works. To make this work, the security and network teams must have at least as much knowledge of the network as the attacker has obtained during the attack process.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    within the facility, and training goals on the recognition and prevention of social engineering attacks. Authorization policies will also include access controls for data by specifying which data should be encrypted, they would…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    week2 lab#4

    • 258 Words
    • 2 Pages

    7. Yes, before penetrating a system, you would always want to get permission from the owners.…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are a number of techniques and processes available when carrying out a Passive Information Gathering exercise. A lot of important information can be passively harvested and subsequently used in a direct attack or to reinforce other attacks targeted at an organization. Depending upon the source, information such as current service patching levels, internal network…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Monitoring traffic will help for see intrusions into the network. Any traffic that is out of the ordinary will…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    remote access and data trolling capabilities alone will cause the attacker to access any and all desired…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    I would change the administrative passwords on all systems routinely, implement a firewall program with remote access control which will not allow, hackers entry to your company’s system.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    2. In order to exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hacking2E Lab03 AW

    • 563 Words
    • 3 Pages

    The first phase of hacking is the footprinting phase, which is designed to passively gain…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC362 Lab 4 Assessment

    • 412 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows 2003 XP server?…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In order to figure out your objectives, you need to complete Intel-gathering missions. To complete missions, players have access to a variety of weapons, gadgets, and gear. These include several sniper and assault rifles, drones, and camouflages. Players can also upgrade their rifles and bullets, which increases their efficiency and accuracy.…

    • 427 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:…

    • 299 Words
    • 2 Pages
    Satisfactory Essays