Preview

IS4560 Unit 1 Assignment 1

Satisfactory Essays
Open Document
Open Document
275 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS4560 Unit 1 Assignment 1
Randy Murphy
IS4560
Unit 1 Assignment 1

In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:
* Malicious code activity
* Tends to increase in countries experiencing rapid growth in broadband infrastructure and connectivity, , readily available malicious code kits are making it simple for attackers to mount attacks, the online underground economy and malicious activity are benefiting from the downturn in the global economy.
* Web-based targeted attacks on enterprises are increasing
* Targeted attacks using advanced persistent threats (APT )
* Designed to remain undetected in order to gather information over prolonged periods. This type of attack has been observed in other large-scale data breaches that caused large numbers of identities to be exposed
* Hacking attack using an SQL-injection attack
* The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.
* Researching publically available information about a company or its employees
* Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.
* Messages often contain attachments that exploit weaknesses in client-side applications, or links to websites that exploit vulnerabilities in Web browsers or browser plug-ins.
* A successful attack could give the attacker access to a company’s network.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS4560 Unit 3 Assignment 1 Information Gathering Plan The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Second threat is Spam. Spam is expected to increase to 80 to 90 percent of total email. Moreover, the boundary between spam and viruses is blurring. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information.…

    • 546 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    H. phishing 3. Attacks involving manipulating and tricking individuals into divulging confidential information, such as imposter emails…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    [pic] http://www.breach.com/resources/whitepapers/downloads/WP_WebHackingIncidents_2008.pdf Besides the cultures in countries being targets for these attacks, the industry sees a large amount of these attacks as well (See figure below). It is because of these trends, that cyber terrorism is a growing concern.…

    • 2129 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Ethical Computer Hacking

    • 1026 Words
    • 5 Pages

    There are a many types of hacks, and hackers in the cyber world. A hack can be any modification done to virtually anything, to make it do something better, or something completely different. Many hackers are hackers of electronic equipment, mostly computers, but even cell phones, routers, iPods, digital cameras, and even the Toyota Prius have been hacked to get better gas mileage with the hybrid-electric engine (Rupley). But besides modifying computers themselves or gadgets, hackers play a significant role in the networking world.…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    4. Data diddling- This kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed.…

    • 3472 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Virus hunters

    • 809 Words
    • 4 Pages

    wanting to steal information, whether corporate data or personal user account information that can be…

    • 809 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    social crime

    • 1719 Words
    • 7 Pages

    They may get victims’ personal information by sending them a fake e-mail from bank which stated that their bank account has been hacked and their information are needed to overcome the problem.…

    • 1719 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Spare Sam Receiving RO RO RO RO RO F BP RO Shipping RO F RO…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mail may have confidential information. It may contain personal information about employees or contain business secrets such as names and other personal details of customers.…

    • 2175 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Hacking and Cybercrime

    • 730 Words
    • 3 Pages

    Development in Hacking, Cybercrime, and Malware The Symantec Global Internet Security Threat Report noted a shift in malicious activity to be emerging. The growing level of malicious code activity has also resulted in the proposal of a new cybercrime bill. Malicious activity tends to increase in rapid growth in broadband infrastructure and connectivity. In January 2010, reports emerged that dozens of large companies had been compromised by attackers using the Hydra Trojan. Typically, this type of attack begins with some reconnaissance on the part of attackers. Typically, this type of attack begins with some reconnaissance on the part of attackers. This can include publicly available information about the company and its employees, such as from social networking sites. This information is then used to create specifically crafted phishing email messages, often referred to as spear phishing, that target the company or even specific staff members. These email messages often contain attachments that exploit vulnerabilities in client-side application or links to websites that exploit vulnerabilities in web browsers or browser plug-ins. In 2009, 60 percent of identities exposed were compromised by hacking attacks. Which are another form of targeted attack. The hackers gained access to the company payment processing network using an SQL injection attack. The attackers then installed malicious code design to gather sensitive information from the network, which allowed them to easily access the network at their convenience. The attacks resulted in the theft of approximately 130 million credit card numbers. Web-based attacks have replaced the mass mailing worm in this position. Attackers may use social engineering, such as in spam messages, to lure a user to a website that exploit browser and plug-in vulnerabilities. These attacks are then used to install malicious code or other applications such as rogue security software on the victim’s computer. Four of the top five…

    • 730 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    http:www.irjmst.com Page 243 Cyber crime How and Why Hackers attacks Systems - IRJMST By Jagmender Singh…

    • 1647 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    waste disposal

    • 7404 Words
    • 24 Pages

    CHAPTER ONE INTRODUCTION TO STUDY 1.1 Introduction There is no disputing the facts... the number of hacking and intrusion incidents is increasing year on year as technology rolls out. Unfortunately in todays inter-connected e-commerce world there is no hiding place: you can be found through a wide variety of means: DNS, Name Server Lookup, NSlookup, Newsgroups, web site trawling, e-mail properties and so on.…

    • 7404 Words
    • 24 Pages
    Powerful Essays
  • Satisfactory Essays

    Advantages Of Biometric

    • 348 Words
    • 2 Pages

    hacking Gaining unauthorized access to a computer system Ways to hack Phishing- the fraudulent practice of sending emails purporting to be reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers online. Guarding against Phishing:…

    • 348 Words
    • 2 Pages
    Satisfactory Essays