Danish Ahmad Quiz 1
docx
keyboard_arrow_up
School
Northern Virginia Community College *
*We aren’t endorsed by this school
Course
241
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by ahmaddanish
1
Danish Ahmad
Malware, Phishing, and distributed Denial of Service (DDoS) Attacks.
Cyberattacks come in various forms and the significant impact they have can vary
depending on the vulnerabilities they can exploit. Three types of attacks I will be discussing are
Phishing attacks, Malware attacks, and Distributed Denial of Service (DDoS) attacks. As I
explain the impact these attacks have, I will be showing you examples of the detriment they have
caused as well.
Phishing is a type of cyberattack and social engineering technique used by malicious
actors to trick individuals into divulging sensitive information such as login credentials, financial
details, or personal information. Phishing attacks take on various forms such as spear phishing,
vishing, and smishing. In 2016, during the U.S. presidential election, Russian hackers used spear
phishing to target the Democratic National Committee (DNC). They sent malicious emails that
appeared legitimate to DNC employees, tricking them into clicking on links or downloading
attachments. This led to the compromise of sensitive emails and documents, which were
subsequently leaked, impacting the election's dynamics, and raising concerns about foreign
A malware attack involves the use of malicious software to compromise a computer
system, network, or device for malicious purposes. Malware is a broad category of software that
is designed to harm, steal data, disrupt operations, or gain unauthorized access to computer
systems. Malware can take many forms, and its goals can vary, but the common thread is that it's
intended to cause harm or provide unauthorized access to a victim's system. Common types of
malware are Ransomware, worms, trojans, worms, spyware, and adware. In May 2017, the
2
WannaCry ransomware attack wreaked havoc worldwide. It exploited a vulnerability in
Microsoft Windows called Eternal Blue, which allowed it to spread rapidly across networks.
Once a computer was infected, WannaCry encrypted its files and demanded a ransom in Bitcoin
for decryption. This attack affected hundreds of thousands of computers in over 150 countries
and disrupted critical services, including healthcare systems and transportation networks.
A Distributed Denial of Service (DDoS) attack is a malicious cyberattack in which
multiple compromised computers, often referred to as "bots" or "zombies," are used to flood a
target system or network with a massive amount of traffic, overwhelming its resources and
causing it to become inaccessible to legitimate users. The primary goal of a DDoS attack is to
disrupt the target's online services, rendering websites, applications, or networks temporarily or
indefinitely unavailable. DDoS attacks can be categorized into several types such as Volume-
based, Protocol-Based, Application layer, and Distributed Reflective Attacks. In October 2016, a
massive DDoS attack targeted Dyn, a major Domain Name System (DNS) service provider. The
attackers harnessed a botnet of compromised Internet of Things (IoT) devices to flood Dyn's
servers with traffic, overwhelming them and causing widespread internet disruptions. Popular
websites and services, including Twitter, Netflix, and Reddit, experienced outages. This attack
highlighted the vulnerability of critical internet infrastructure to DDoS assaults.
As you can see, malware, phishing, and DDoS attacks continue to be significant threats in
the ever-evolving landscape of cybersecurity. Their impact extends beyond the immediate
financial and operational consequences, affecting trust, privacy, and the overall security posture
of individuals and organizations. As technology continues to evolve, it is going to be important
to implement cybersecurity strategies to mitigate these attacks. The best practices to adopt should
be to safeguard your digital assets and maintain the integrity of your online systems.
3
References:
Perlroth, N. (2019, January 18). D.N.C. Says It Was Targeted Again by Russian Hackers
After ’18 Election.
The New York Times
.
https://www.nytimes.com/2019/01/18/technology/dnc-
russian-hacking.html
Fruhlinger, J. (2022, August 24).
WannaCry explained: A perfect ransomware storm
.
CSO Online.
https://www.csoonline.com/article/563017/wannacry-explained-a-perfect-
ransomware-storm.html
Young, K. (2022, January 10).
Cyber Case Study: The Mirai DDoS Attack on Dyn
.
CoverLink Insurance - Ohio Insurance Agency.
https://coverlink.com/case-study/mirai-ddos-
attack-on-dyn/#:~:text=On%20Oct
.
How to Prevent DDoS Attacks, Phishing, and Other Cyber Threats | TechInsurance
.
(n.d.). Www.techinsurance.com.
https://www.techinsurance.com/resources/protect-against-ddos-
phishing-cyber-threats
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4