McCurley-Shimer_Assignment #2

docx

School

American Military University *

*We aren’t endorsed by this school

Course

452

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

5

Uploaded by DeanHippopotamus5891

Report
Assignment 2 1 Assignment 2 Alexus McCurley-Shimer American Military University ISSC452 Cybersecurity Professor Booth November 14, 2023
Assignment 2 2 There are many different types of threats in this world from physical to threats that happen with technology. Understanding the different threats and how they are utilized is important. In this presentation we will go into what the threats are and how they are conducted. As well as what should be done to combat these threats. 1. Insider threats: “An insider threat occurs when individuals close to an organization who have authorized access to its network intentionally or unintentionally misuse that access to negatively affect the organization’s critical data or system.” (Rosencrance, L. 2023, February 7) This can be done as simple as emailing a customer data to an external party and or clicking a phishing link in an email. 2. Viruses and worms: Though some of you might think these are physical things they are not in the sense of technology. Viruses and worms are malicious software programs that are able to destroy an organizations system as well as data and network. Though the worms are not typically known to do much but continue to replicate itself and spread to as many devices as possible. These two types of threats are able to be dormant until someone either knowingly or inadvertently activates them and spreads the infection to as many systems as possible. 3. Botnets: This is a collection of internets connected devices such as computers, mobile devices, servers and more. This type of infection is able to be accessed remotely and controlled by a common type of malware. Botnets can be contracted by spam emails, click fraud campaigns and are able to generate malicious types of traffic to distribute a denial-of-service attack.
Assignment 2 3 4. Drive-by download attacks: This can be done when malicious code is downloaded from websites by the browser, application or integrated operating system without a user’s knowledge or permission. 5. Phishing attacks: These are typically done by email that has malicious intent. These are done by social engineering tricks. Which is where an attacker states something that will make you either want to donate to help or to download more information that the email has. They use this tactic to gain login credentials, social security numbers, and more sensitive information. 6. Distributed denial-of-service attacks: This is when many different machines are under attack such as server, website or other network resources by flooding the connection with requests, incoming messages and more. 7. Ransomware: This is when an attack takes over a device or a network and is holding it hostage and the only way to get it back is by paying them to gain access back to the device or network. 8. Exploit kits: This is a programming tool that is able to enable a person without any experience to write software code to be able to create customize and distribute malware. 9. Advanced persistent threat attacks: This is when a cyberattack is targeting a user and is able to intrude the network and remain undetected for an extended period of time. 10. Malvertising: This is a technique that cybercriminals are able to use to inject malicious code into a legitimate online advertising network and webpage. Though there are many attacks and that it seems to be overwhelming. How can you combat all of these different attacks? Will it ever be safe to use a computer? Well, we will be going over 4 different steps that can be taken to help combat these information security threats.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assignment 2 4 1. Multifactor authentication: “…opting-into an extra step when trusted websites and applications ask you to confirm you’re really who you say you are.” (Cybersecurity and Infrastructure Security Agency CISA. 2023, November 13) 2. Update your software: Ensuring that the devices are up to date as well as any application that is used is updated is important. Updates are created due to an issue arising and the update has the updated repair that needs to be placed for the software. 3. Think before you click: If you see an advertisement or if you get an email. Do not just go click on it. Think about it, if it is an advertisement go to the actual website. If it is legit then you will be able to access the same advertisement through the website. If you receive and email that you do not know who the person is then do not open it. 4. Use strong passwords: This can avoid attacks or people getting into a system or getting all of your sensitive data.
Assignment 2 5 Refences: 4 things you can do to keep yourself cyber safe: CISA . Cybersecurity and Infrastructure Security Agency CISA. (2023, November 13). https://www.cisa.gov/news-events/news/4-things- you-can-do-keep-yourself-cyber-safe Rosencrance, L. (2023, February 7). Top 10 types of information security threats for IT teams: TechTarget . Security. https://www.techtarget.com/searchsecurity/feature/Top-10-types-of- information-security-threats-for-IT-teams