IT550 Assignment Unit 1 Kaplan University As the digital age progresses, more and more business is conducted electronically. Symbiotically illegal activities of those that wish to prosper from security vulnerabilities will increase. Cybercrime can be motivated by a number of factors including terrorism. Cyberterrorism is any terrorist act that uses computers as the vehicle for their attack. Cyber terrorists can be motivated to target organizations that will result in the radical’s group to cause the most harm and/or receive the most attention for their party.
Networked Systems Security Task 1 – THREATS AND IMPACT OF NETWORK THREATS There are many types of threats that can damage your computer either temporarily or permanently. Some threats posed may not threaten your computer right away however have the potential to do so. Some threats that present themselves can include physical threats such as the theft of equipment whether that is the monitor, computer etc. Other threats can be harder to find such as viruses, worms or any kind of malware. Understanding these threats allows the organisation to prevent, protect and correct any damage done to his/her computer to an extent.
The risks that exist would come from a suspecting end-user, potentially some form of malware, that would be installed through an open port, thus causing the integrity of a machine on that network to be severely compromised (Lawrence, 2000). Ping sweeps and port scans are two direct unsuspecting threats that, like other cyber threats, are not to be ignored. The ease of gaining access by using these threat sources is something that a business should be aware of and be prepared to address when faced with being at the end of a cyber-attack. Implementing appropriate policy to counteract such a malicious and serendipitous attack on network vulnerabilities should be considered as an additional failsafe. Protection is the key and showing extra caution can at least reduce the
Criminals are turning to cyber-crime because of the speed and convenience. Cyber-crimes include attacks against computer data and systems, identity theft, Internet fraud, e-mail scams, and phishing. In addition the threat of terrorism forces authorities to address security vulnerabilities related to information technology infrastructure such as power plants, electric grids, information systems, and the computer systems of government and major companies. References Cantor, M. (2013). Pentagon on cyber security force: Quintuple it.
The trafficking, arrangement, transmission, and spreading of raunchy real including creation and uncomely exposure, constitutes one of the most valuable Cybercrimes familiar today. Cyber harassment is a definite cybercrime. Various kinds of harassment such as racial, religious, or other can be occurred through the use of cyberspace. Misconduct of privacy of online citizens is a Cybercrime of a heavy nature. No one likes any different being invading the valuable and extremely sensitive area of his or her own secrecy which the substance of net grants to the
Two basic approaches are used in deliberate attacks on computer systems: data tampering and programming attack. Data tampering is a common means of attack that refers to an attack when someone enters false, fabricated or fraudulent data into a computer or changes or deletes existing data. This is the method often used by insiders and fraudsters and is extremely serious because it may not be detected. Programming attacks are popular with computer criminals that use programming techniques to modify other computer programs. For these types of crimes, programming skill and knowledge of the targeted systems are needed.
Port scan is as the name implies, a scan of the open ports on each computer of the network to define which ports are open and what services are running on them. This information can be used to set up an attack on the network by allowing the hacker to bypass vulnerability in the software being run or on any open ports that can be used to gain deeper access to the network. With a port scan the probe sends information to each port on the network and the open ones respond back, this data can be used to determine the easiest way to infiltrate the network. The safest way to defend against this type of probe is using a firewall. Just as in a ping sweep, if you deny access to a port scan requesting information from the network you render them
Unit 9 Assignment 1: List Phases of a Computer Attack In this assignment I am a hacker who needs to protect my organization from a computer attack. I will list general phases of a computer attack. We have an organization that we need to protect from outside attacks by foreign parties. I am an ethical hackers who needs to take preventative measures in order to adequately secure the network against these attacks. Many attackers follow a general set of steps in order to gain the permissions necessary to break into a system.
Felecia Frazier Principles Info Sys Security July 14, 2015 DeVry University Ports Scans and Ping Sweep Ping sweep and port scans are computer activities that dishonorable people use to gain access to your private networks. It also can be useful for protecting or information because if we us port scan we can find out if someone have hacked into your system. Heinous computer activities, such as port scans and ping sweep are how some hackers get your information out your computer. A port scan is a technique for determine which port on a network is open. When running a port scan on a network it discloses which ports are open and receiving data, it also discloses the existing security devices such as firewall that are available
The ping sweeps and port scans are the two techniques that malicious computer users such as hackers that can use to compromise an Enterprise networks security and gain access to their proprietary data. The ping sweeps are performed to find an open-door into a particular end-point. A person usually can find all kinds of utilities on the internet to exploit the open-doors on the system and gain access to important and confidential files on the network. It is a good idea that we try to protect ourselves against all these types of activities on the network and to also try to conduct them ourselves that way we know that out networks are safe. The ping sweeps are what you really think they are.