Only available on StudyMode
  • Download(s) : 77
  • Published : March 10, 2013
Open Document
Text Preview

Assignment 2-Identifying potential risk, response and recovery CIS 333 Section 107 VA016
February 24, 2011

With operating a business, there are good and bad things that can go wrong. There are you can get robbed by outsiders, your employees can steal from you and your business can suffer from lack of profits. All of these situations are horrible, but there are other attacks on your business that you need to be concerned with. These malicious attacks are fair worse because they can go undetected. A malicious attack is an attack on a computer system or network asset succeeds by exploiting vulnerabilities in the system (Kim, 2012). There are many forms of attacks that you should be mindful of. Brute force, dictionary, man-in-the-middle, and masquerade attacks are some of the attacks that can cause harm to your business and your computer network. Hijacking, phishing and spoofing are also harmful.

In a brute force attack, the attacker tries different passwords on a system until one of them works. Often times the attacker uses a software program that tries all of the possible combinations until one is successful. Because computers today are large in scale, it may take loads of time to crack the codes. A dictionary attack, a password-cracker program, banks on users choosing weak passwords. In order to reduce the chance of this happening in your business, I would suggest that you have everyone change their passwords often. When choosing a password, make sure that it has a minimum of 8 characters, is alpha/numeric and include at least one symbol.

Man-in-the-middle attack is another type of attack to be mindful of. This type of attack is a form of eavesdropping. It breaches security by allowing the attacker to intercept messages between two parties and then transfers them to another destination. The secure connection that you think you have is...
tracking img