Preview

Isc342 Unit 2 Research Paper

Satisfactory Essays
Open Document
Open Document
488 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Isc342 Unit 2 Research Paper
ISSC342
Week 1 Assignment
American Military University

1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.
As our society realize more and more on technology like computers and smart phones to conduct every day things such as banking, work, school, and staying connected with family and friends, our personal information has become more vulnerable to attack. Before computers, if someone wants to steal your personal information they would need to break in to your house, work and car to try and get your information. Now everything about us are stored right on our computers from banking information, to medical information. Some of the most common forms of attack on Microsoft system are Trojan horse, backdoor, denial of service, robot/intermediary process, unprotected
…show more content…
Denial of services is an attack on networks that are intended at making computer or particular service on a computer unavailable.
Robot/intermediary process is a form of attack that is lunched on one computer but attacks another computer.
Unprotected Windows Share is an easy method of allowing remote access or sharing to computers. This type of attack is commonly used with shared folder and printers.
Mobile code refers to interpreted or executable content that can be downloaded and run on a user’s computer. This type of attack offers the user visiting the site a method that’s provide a rich and dynamic content to users.
Cross-site scripting is a type of computer security exposure found in web function such as XSS which attacker attach to the client side of a script.
Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge

You May Also Find These Documents Helpful

  • Good Essays

    The goal of an XSS attack is to gain administrator or some other elevated level of user privileges.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Manual/ White Box: In this technique, a thorough code review is performed over the whole code, which may become a very tedious and tiresome process. But in this process, logical flaws may be identified which may not be possible using automated tools, such as business logic problems. Automated tools are mostly capable of finding technical flaws such as injection attacks but may miss flaws like authorization problems. In this process, instead of going line by line through whole code base, we can concentrate on potential problems in the code. Those potential vulnerabilities can be given a high priority. For example, in C/C++, if we try to find any copying function in the code and check whether it’s using functions such as, strcpy() for performing copy function. As we know, strcpy() is known to be vulnerable to buffer overflow attacks. We may also want to check if any customized encryption is being used in the application, which automated tools may miss as they can identify standard algorithms only…

    • 813 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    ____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    ____ occurs when an attacker intercepts packets with encrypted data and changes the destination address to forward the packets to a different destination on the Internet.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Sec572 Research Paper

    • 587 Words
    • 3 Pages

    Computer networks are bunches of computers connected to each other. That is, either physical wires run between computers-wires in an office (LAN), dedicated phone lines (DSL), dial-up connections, fiber optic, or there is an electromagnetic connection-radio links or microwaves. Simply, when one computer wants to talk to another, it creates a message called a packet. The packet has the destination computer’s name on it and sends it to the computer over this network. Computers don’t use circuits to talk to each other. They don’t have conversations like people do. They send short data packets back and forth. These packets are broken-up pieces of anything: e-mails, gifs, streaming video or audio, or Internet phone calls. Computers divide…

    • 587 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC362 Lab 4 Assessment

    • 412 Words
    • 2 Pages

    Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    To begin one of the most basic types of possible threats can come from what is called an IP sweep. What an IP sweep basically is a broad area ping that allows the user to determine what hosts if any exist on a network given a certain IP address range. A normal ping consists of a single hello message from one computer to the receiving computer. A ping sweep pings any and all computer to determine which are alive so that the attacker can figure out where he can attack the network.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A general term for software that is designed to destroy or disrupt data or do other unwanted actions in a computer system.…

    • 1399 Words
    • 6 Pages
    Satisfactory Essays
  • Best Essays

    Unix/Linux

    • 2760 Words
    • 12 Pages

    Windows, a much younger operating system, released in 1985, has exponentially grown in popularity ever since. Windows popularity is the biggest reason that it suffers malicious attacks more than any other operating system available. The numerous attacks…

    • 2760 Words
    • 12 Pages
    Best Essays
  • Best Essays

    Meier, J.D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R. & Murukan, A. (2003, June). Threats and countermeasures. Microsoft. Retrieved from http://msdn.microsoft.com/en-us/library/ff648641.aspx…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    As cyber-attacks related to information warfare have increased throughout the twenty first century we have seen a rise the use of cyber-attacks by nation states. These nation state attackers focus on targeting other nations in the hope of disrupting the nation’s economy, causing public panic, or crippling a country defenses along with many other goals which damage a nation. These attacks in turn allow the nation state which performed the attack to weaken the other nation, make political statement, steal nation’s information or resource, or use the attacks as a greater warfare plan. This often raises the question when discussing nation state cyber-attacks…

    • 843 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Spoofing Facts

    • 433 Words
    • 2 Pages

    Spoofing is used to hide the true source of packets or redirect traffic to another location. Spoofing attacks:…

    • 433 Words
    • 2 Pages
    Good Essays
  • Good Essays

    You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities. Explain to your CIO what you can do to make sure the network infrastructure is more secure.…

    • 732 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In real world scenario, a Denial-of-Service attack DoS attack) or Distributed Denial-of-Service attack (DDoS attack) is an effort to make a machine or network resource unavailable to its genuine users. Although the means to carry out, motives for, and objective of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or eliminate services of a host connected to the internet. One common method of attack involves saturating the target machine with outside communications requests, so much so that it cannot respond to legitimate traffic or responds so lowly as to be rendered essentially unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are carried out by either…

    • 286 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Electronic Crime

    • 3971 Words
    • 13 Pages

    While the vulnerability of software not up-to-date and lack of monitoring in systems will lead to attack so called Distributed Denial of Services (DDOS) attack. Different from Denial of Services (DOS), a DDOS is an upgraded version of DOS attack. Both DOS and DDOS is aiming to overload the systems and deny services that providing by servers and make it disconnect from legitimate users. A DDOS is very difficult to shut down and defend because it comes from many computers around the world at once.…

    • 3971 Words
    • 13 Pages
    Better Essays