Preview

Identifying Potential Malicious Attacks

Better Essays
Open Document
Open Document
1430 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Identifying Potential Malicious Attacks
Identifying Potential Malicious Attacks, Threats and Vulnerabilities
CIS 333 Network Security Fundamentals
July 23, 2014

We have been tasked by the CIO to draft a report identifying potentially malicious attacks, threats, and vulnerabilities specific to our organization. Further, the CIO would like us to briefly explain each item and potential impact it could have on the organization.
Malicious Network Attacks
"Network attack is usually defined as an intrusion on your network infrastructure that will first analyze your environment and collect information in order to exploit the existing open ports or vulnerabilities - this may include as well unauthorized access to your resources" (Symantec, 2013). We will first have to analyze the potential attacks we need to protect against, and the potential impact those attacks could have on the network. The majority of threats we will encounter are classified as viruses, hacks, and blended attacks.
1. Viruses. "A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet)." (Symantec, 2013). Due to the shear frequency of virus attacks, we shall list them number one. According to a Department of Trade and Industry (DTI) survey, 72% of all companies received infected e-mails or files last year and for larger companies this rose to 83% (Vernon, 2004). The potential impact of the network becoming infected with a virus could be devastating. File destruction, file corruption, disabling user programs, loss of critical data and overloading the network are just a few of the potential impacts of a virus. Viruses can be introduced in to the network in many ways. Employees downloading /using unauthorized programs, opening and executing infected email attachments, bringing infected files from home on a thumb drive or CD, accessing the network with their smart phone,



Cited: Gale, S. F. (2013, April 2). BYOD Brings Security Risks for Companies. Retrieved July 14, 2014, from workforce: http://www.workforce.com/articles/byod-brings-security-risks-for-companies Lawson, A. (2014, May 23). Businesses need to wake up and smell the hackers. Retrieved July 23, 2014, from The Independent: http://www.independent.co.uk/news/business/analysis-and-features/businesses-need-to-wake-up-and-smell-the-hackers-9422300.html Piscitello, D. (n.d.). What is a blended threat? Retrieved July 23, 2014, from The Security Skeptic: http://securityskeptic.typepad.com/the-security-skeptic/what-is-a-blended-threat.html SupportSoft. (2005, March). By the Stats: The Impact of Computer Virus Attacks on Business. Retrieved July 23, 2014, from Retail Online Integration: http://www.retailonlineintegration.com/article/by-stats-the-impact-computer-virus-attacks-business-51445/1 Symantec. (2013, December 27). Security 1:1 - Part 3 - Various types of network attacks. Retrieved July 23, 2014, from Symantec: http://www.symantec.com/connect/articles/security-11-part-3-various-types-network-attacks Vernon, M. (2004, April). Top five threats. Retrieved July 23, 2014, from Computer Weekly: http://www.computerweekly.com/feature/Top-five-threats

You May Also Find These Documents Helpful

  • Powerful Essays

    Stavrou, A., & Institute for Security Studies (South Africa). (2002). Mission Impossible? : E-Security In South Africa 's Commercial And Financial Sectors. Pretoria, South Africa: Institute for Security StudiesRufi, A. W., & Cisco Networking Academy Program. (2007). Network Security 1 and 2 Companion Guide. Indianapolis, Ind: Cisco Press…

    • 1233 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    Marsan, C. D. (2009, June 9). Hidden Threat on Corporate Nets: Misconfigured Gear. Retrieved April 4, 2011, from CIO: http://www.cio.com/article/494522/Hidden_Threat_on_Corporate_Nets_Misconfigured_Gear…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).…

    • 805 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LAB 3

    • 531 Words
    • 3 Pages

    Risk planning is developing and documenting organized, comprehensive, and interactive strategies and methods for identifying risks.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The purpose of this paper is to explore and assess computer security as it relates to Aircraft Solutions. Aircraft Solutions provides products and services to a range of companies that require highly specialized skills. Information is accessed by internal and external users via their Business Process Management system.…

    • 1345 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    * Markoff, J., (2005). At Microsoft, Interlopers Sound Off on Security: New York Times. Viewed June 26, 2013.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Schwartz, M. J. (2012, January 17). 10 Security Trends To Watch In 2012. Retrieved from http://www.informationweek.com/security/vulnerabilities/10-security-trends-to-watch-in-2012/232400392…

    • 1179 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Demise of Unix

    • 1767 Words
    • 8 Pages

    Garfinkel, S., & Spafford, G. (1996). Practical unix & internet security. Sebastopol, California: O 'Reilly Media.…

    • 1767 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    Computer Hacking

    • 4083 Words
    • 17 Pages

    11. McClure, Stuart. Et al. (2003), Hacking exposed: Network security secrets & solutions, Fourth edition, Berkley, California (USA), McGraw-Hill/Osborne.…

    • 4083 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    the top 5 malwares

    • 3607 Words
    • 15 Pages

    AP”Computer virus causes havoc on systems worldwide”. The Manila Bulletin. (May 06, 2000). p.329 (6):1-6…

    • 3607 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Hardware and software are key pieces of any organization’s infrastructure. Components in each domain of the seven domains of the IT infrastructure may connect to a network or to the internet, and can be vulnerable to malicious attacks. Malicious attacks on hardware and software can also lead to more widespread problems. These problems can include loss of critical data or theft of financial information or intellectual property. Unprotected IT and network infrastructure assets can offer attackers and cybercriminals the widest opening to access sensitive resources. The ease of access makes assets that are connected to the internet the most common first point of attack. That means those assets should be you first line of defense. Technical failure and human error are the most common causes of unintentional downtime. Malicious attacks can occur and cause downtime in all seven domains of an IT infrastructure, but you are more likely to see them in the User, Workstation, LAN, and WAN domains. Opportunity cost is the amount of money a company losses due to downtime. The downtime can be either intentional or unintentional. Some organizations refer to opportunity cost as true downtime cost. It usually measures the loss of productivity experienced by an organization due to downtime. One of the most important things that information security professionals try to protect is their organization’s reputation and brand image. Companies that suffer from security breaches and malicious attacks that expose any assets are likely to face serious negative consequences in the public eye. In the popular usage and in the media, the term hacker often describes someone who breaks into a computer system without authorization. In most cases that means the hacker tries to take control of a remote computer through a network, or software cracking. The media and the general public also use the word hacker to describe anyone accused of using technology for terrorism, vandalism, credit card fraud,…

    • 1126 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Cyberterrorism

    • 3167 Words
    • 13 Pages

    Blau, J. (2004, November 29). The Battle Against Cyberterror. Retrieved November 2012, from Network World: http://www.networkworld.com/supp/2004/cybercrime/112904terror.html…

    • 3167 Words
    • 13 Pages
    Best Essays
  • Better Essays

    Dumitru, Bogdan. "Emerging Threats to Business Security." 2009. Bitdefender Web site. 01 05 2011 .…

    • 1652 Words
    • 7 Pages
    Better Essays