McCurley-Shimer_Assignment #3

docx

School

American Military University *

*We aren’t endorsed by this school

Course

452

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by DeanHippopotamus5891

Report
Assignment 3 1 Assignment 3 Alexus McCurley-Shimer American Military University ISSC452 Cybersecurity Professor Booth November 22, 2023
Assignment 3 2 “A Backdoor attack is mounted on malware that negates routine authentication procedures to access a system.” (Firch 2022) Backdoors often are used to for many different malicious activities such as data theft, website defacing, server hijacking, DDoS attacks, and other advanced persistent threats. There are ways to prevent this threat from happening. The first is to use an anti-virus solution. The second is to implement monitoring tool on the network. The third is to have a solution to detect an untrusted software on endpoints. The final is the ensure that each device is protected by a firewall. “Password attack is a common attack vector used to bypass or exploit authentication of user accounts.” (Sengupta 2022) Password attacks are done when an attacker is able to guess and crack a password. Attackers are able to use many different techniques to gain access to an individual’s credentials and assume their identity. There are many different ways to prevent these types of attacks. The first is to ensure that there is a strong password policy in place. The second is to have password security training. The third is to have a multi factor authentication system. The last is to have a password management system to ensure that the passwords are chanced periodically throughout the employee’s time with the company or organization. “Spoofing is a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information.” (Belcic & Farrier 2023) Spoofing happens when a hacker pretends to be someone that they are not and gets the victim to trust the hacker. There are many different ways to ensure that an individual does not become a victim of spoofing. Such as to stay sharp and be vigilant on common spoofing attacks, call to confirm that the person sending you the email is legit, be wary of strange attachments, and more.
Assignment 3 3 “A sniffer is a software or hardware tool that allows the user to “sniff” or monitor your internet traffic in real time, capturing all the data flowing to and from your computer.” (Belcic 2023) Criminals will use social engineering tricks or phishing scams to be able to get a victim to download the sniffers. There are many ways to prevent these attacks from happening. The first is to ensure that there is a strong security software in place. The second is to encrypt data by using a VPN. The third is to ensure that a user is not visiting unencrypted websites. The fourth is to not use public Wi-Fi. The last is to ensure that a user does not use unencrypted messaging apps. “Timing attacks take advantage of the fact that different inputs to login forms can take differing amounts of time to process.” (Cramer 2023) These attacks are able to use long inputs to take over and repeat attempts to begin to reveal patterns that the attacker can extrapolate and build from. There are ways to prevent the timing attacks such as normalizing the amount of time it can take for login requests. Which can ensure that there will be no data taken for a timing attack and the information will not be gained by an attacker.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assignment 3 4 References: Belcic, I. (2023, February 23). What is a Sniffer, and How Can I Protect Against Sniffing? . What is a sniffer, and how can I protect against sniffing? https://www.avast.com/c- sniffer#:~:text=A%20sniffer%20is%20a%20software,against%20sniffers%20with%20a %20VPN. Belcic, I., & Farrier, E. (2023, February 23). What is spoofing and how can you prevent it? . What Is Spoofing and How Can I Prevent it? https://www.avast.com/c-spoofing Cramer, R. (2023, October 20). Timing attacks and how to prevent them . ProcessWire. https://processwire.com/blog/posts/timing-attacks-and-how-to-prevent- them/#:~:text=Timing%20attacks%20take%20advantage%20of,may%20extrapolate %20and%20build%20from. Firch, J. (2022, December 13). Free it & cyber security policy templates for 2022 . PurpleSec. https://purplesec.us/resources/prevent-cyber-attacks/backdoor/ Sengupta, S. (2022, September 20). Password attack - definition, types and prevention . Crashtest Security. https://crashtest-security.com/password-attack/