Danish Ahmad Quiz 1

docx

School

Northern Virginia Community College *

*We aren’t endorsed by this school

Course

241

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by ahmaddanish

Report
1 Danish Ahmad Malware, Phishing, and distributed Denial of Service (DDoS) Attacks. Cyberattacks come in various forms and the significant impact they have can vary depending on the vulnerabilities they can exploit. Three types of attacks I will be discussing are Phishing attacks, Malware attacks, and Distributed Denial of Service (DDoS) attacks. As I explain the impact these attacks have, I will be showing you examples of the detriment they have caused as well. Phishing is a type of cyberattack and social engineering technique used by malicious actors to trick individuals into divulging sensitive information such as login credentials, financial details, or personal information. Phishing attacks take on various forms such as spear phishing, vishing, and smishing. In 2016, during the U.S. presidential election, Russian hackers used spear phishing to target the Democratic National Committee (DNC). They sent malicious emails that appeared legitimate to DNC employees, tricking them into clicking on links or downloading attachments. This led to the compromise of sensitive emails and documents, which were subsequently leaked, impacting the election's dynamics, and raising concerns about foreign A malware attack involves the use of malicious software to compromise a computer system, network, or device for malicious purposes. Malware is a broad category of software that is designed to harm, steal data, disrupt operations, or gain unauthorized access to computer systems. Malware can take many forms, and its goals can vary, but the common thread is that it's intended to cause harm or provide unauthorized access to a victim's system. Common types of malware are Ransomware, worms, trojans, worms, spyware, and adware. In May 2017, the
2 WannaCry ransomware attack wreaked havoc worldwide. It exploited a vulnerability in Microsoft Windows called Eternal Blue, which allowed it to spread rapidly across networks. Once a computer was infected, WannaCry encrypted its files and demanded a ransom in Bitcoin for decryption. This attack affected hundreds of thousands of computers in over 150 countries and disrupted critical services, including healthcare systems and transportation networks. A Distributed Denial of Service (DDoS) attack is a malicious cyberattack in which multiple compromised computers, often referred to as "bots" or "zombies," are used to flood a target system or network with a massive amount of traffic, overwhelming its resources and causing it to become inaccessible to legitimate users. The primary goal of a DDoS attack is to disrupt the target's online services, rendering websites, applications, or networks temporarily or indefinitely unavailable. DDoS attacks can be categorized into several types such as Volume- based, Protocol-Based, Application layer, and Distributed Reflective Attacks. In October 2016, a massive DDoS attack targeted Dyn, a major Domain Name System (DNS) service provider. The attackers harnessed a botnet of compromised Internet of Things (IoT) devices to flood Dyn's servers with traffic, overwhelming them and causing widespread internet disruptions. Popular websites and services, including Twitter, Netflix, and Reddit, experienced outages. This attack highlighted the vulnerability of critical internet infrastructure to DDoS assaults. As you can see, malware, phishing, and DDoS attacks continue to be significant threats in the ever-evolving landscape of cybersecurity. Their impact extends beyond the immediate financial and operational consequences, affecting trust, privacy, and the overall security posture of individuals and organizations. As technology continues to evolve, it is going to be important to implement cybersecurity strategies to mitigate these attacks. The best practices to adopt should be to safeguard your digital assets and maintain the integrity of your online systems.
3 References: Perlroth, N. (2019, January 18). D.N.C. Says It Was Targeted Again by Russian Hackers After ’18 Election. The New York Times . https://www.nytimes.com/2019/01/18/technology/dnc- russian-hacking.html Fruhlinger, J. (2022, August 24). WannaCry explained: A perfect ransomware storm . CSO Online. https://www.csoonline.com/article/563017/wannacry-explained-a-perfect- ransomware-storm.html Young, K. (2022, January 10). Cyber Case Study: The Mirai DDoS Attack on Dyn . CoverLink Insurance - Ohio Insurance Agency. https://coverlink.com/case-study/mirai-ddos- attack-on-dyn/#:~:text=On%20Oct . How to Prevent DDoS Attacks, Phishing, and Other Cyber Threats | TechInsurance . (n.d.). Www.techinsurance.com. https://www.techinsurance.com/resources/protect-against-ddos- phishing-cyber-threats
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4