9/8/2013 SEC280 Case Study Week 1 Case Study: Ping Sweeps and Port Scans Ping sweeps and port scans are not an immediate threat to the company. While it may be used by an attacker to build a profile against the company, it can also be used by an administrator to gather information about the company. Although it is not an immediate threat, it should still be monitored for potential threats because it is a common way for hackers to attempt to break a network. In the following document, more will be discussed about what ping sweeps and port scans are and how they are used to gather information about a company’s network. What is a ping sweep and how does it work?
Case Study For any business ping sweeps and port scans could be a huge security threat if they continue unnoticed. Ping sweeps are performed to find end points on a network. Then a port scan is performed to find an open door into that particular end point or end points. After that anyone can find all kinds of utilities on the internet to exploit these open doors on systems and gain access to important and confidential files on the network. It’s imperative that we not only protect against these types of activities on the network, but that we also conduct them ourselves.
This includes hosts file poisoning, even though the hosts file is not properly part of the Domain Name System. Hosts file poisoning is discussed in the malware section since it involves changing a file on the user’s computer . j) Content-Injection Phishing Describes the situation where hackers replace part of the content of a legitimate site with false content designed to mislead or misdirect the user into giving up their confidential information to the hacker. For example, hackers may insert malicious code to log user's credentials or an overlay which can secretly collect information and deliver it to the hacker's phishing server. k) Man-in-the-Middle Phishing This is harder to detect than many other forms of phishing.
Spyware:- Spyware is a term used used to describe the software and files that is intentionally installed on a computer which is used to monitor what other users of the same computer are doing. It is term designed for get the information secretly about the user activity. Spyware programs are used to track users' habits to better target them with advertisements. Spyware is usually installed onto the user's machine without them knowing when a link is followed by them which redirects the user to a malicious website. PREVENTION FROM THE SPYWARE The system is affected with the spyware by visiting the infected website, downloading inected software etc.
So when your internet provider wants to get a list of all the sites you visited, it will appear that you connected to just one server. Plus, all the data that flows through your VPN channel is encrypted so unauthorized parties can’t access it. This is especially useful when you are using public Wi-Fi. A downside to using this network is you might not be able to use certain websites and services. Another option is to use Tor, a free browser run by a research-education non-profit organization called the Tor Project.
Abstract. The most common ways to keep track of employees is video surveillance, monitoring e-mails, keeping track of pages visited on the Internet and anything else that happens on computer, fixing the time of arrival and departure from work, listen to and record telephone conversations. Some of these methods are quite obvious for employees - for example, time-stamping, but some are hidden and may be disturbing to learn about. Business conduct surveillance not just to protect their employees and property, but to insure that procedures that are in place are being followed and to have a control over the business environment. That invasion of privacy can be justified by employer, but can also be an offense to employee.
Software devices used are; firewalls, Host intrusion Prevention Systems (HIPS), and Antivirus/Malware scanners. The concept of “work factor” is an important part of layering and is defined as the amount of effort a hacker, malware, etc. must use to breach the security measures guarding our network. Obviously, the less work they have to do point out that our security isn’t good. Showing that we have strong, layered security around our data and network will convince them to go elsewhere.
IT department should ensure firewalls are in place and configured to filter the traffic as it comes through. You can also use EICAR standard anti-virus test file on client computers. Instruct users to select one antivirus and one anti-spyware product and install them on their computer: Norton Antivirus; McAfee Antivirus; Avast Pro Antivirus; Bull Guard Antivirus; Webroot; Bitdefender. Most antivirus products are capable of protecting against most malware. I would select Norton antivirus and Webroot anti-spyware Ensuring anti-malware software and data is up-to-date.
How about a tiny computer virus hiding in your computer and collecting all these information for someone else ? Now I’m asking you ; Are you safe now ? The information that I am about to give you in this informative speech will be very important. Thematic statement: We all use computers for such reasons for example school , banking management or social media and pretty sure we all have got accounts in different areas. Hackers can develop programs or fake sites to upload viruses to our computers to get personal informations.
For individuals and organisations these malicious programs can collect authentication data such as account details and passwords which can be later used for cybercrime or hacking. • Spyware: software that covertly transmits data about the activities a user is performing on their system. Spyware can also be used to install additional software, redirect browser searches, change computer settings or disrupt network connections. Typically, spyware is installed during the installation of a piece of free software. • Phishing: is the act of sending emails purportedly from a reputable company in order to trick a user into revealing personal information such as passwords and account details which will be later used for cybercrime.