Preview

CMGT400 Week 2 Team Assignment Kudler Fine Foods IT Security Report Top Threats

Satisfactory Essays
Open Document
Open Document
255 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CMGT400 Week 2 Team Assignment Kudler Fine Foods IT Security Report Top Threats
Top Threats
CMGT/400

Area of System
Threat
Potential Vulnerability
Web site or network.
Denial of Service or DoS.
This will slow the system down considerably or cause the whole network to not function at all which will deny customer access to the service.
Customer and Company Emails
Phishing attempts
Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.
Database
Back door attack
This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.
The customer reward site or network
Spoofing
There are multiple versions of spoofing but this is when the hacker inputs a false header on the packet so it will trick the receiving network that the packet is from a legitimate source. This could send in harmful packets that could damage the network and allow hackers to gain access to the network.
Customer account information for the rewards program
Poor passwords/dictionary attack
This is when a hacker runs a program that will go through all the words in the dictionary and add any special characters such as numbers to try and guess the passwords. This can compromise the customer’s account information, so educating a customer on how to make strong passwords should be recommended.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Links to downloadable files and media could be replaced with malicious code and hackers could gain access and monitor activity within the company.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    btec ict level 3

    • 870 Words
    • 4 Pages

    Security – This is when there are numbers of different ways to secure customers and websites information, this should make sure that they are able to adopt this to reassure their customers.…

    • 870 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Spoofing Facts

    • 433 Words
    • 2 Pages

    Spoofing is used to hide the true source of packets or redirect traffic to another location. Spoofing attacks:…

    • 433 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    In today’s world information security has been taken as a prominent issue, and cybercrimes has been rising at a higher level even the security experts are tired of the online game. Each valuable time there is always a malware installed underground phishing or stealing customer’s information via credit cards or debit cards. Security experts from various hubs are trying to nub the cyber criminals including the FBI and it has been a battle of today’s dark Usenet. Today data is very sensitive to third party users and must be protected with harsh algorithms this was written by Thomas in security concepts 2014 . Data breach refers to any situation in which a person or a group, steals sensitive or confidential data.…

    • 931 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Deceptive Phishing Attacks

    • 1051 Words
    • 5 Pages

    “Phishing” is when cybercriminals try to get personal information like credit card numbers to steal money and passwords to important accounts. They can get this information from you and your computer. They can do it through emails, text messages, phone calls even. There are many techniques and styles attackers use to get this information out of people.…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Security Plan

    • 3805 Words
    • 16 Pages

    If someone accidentally unplugs or turns off the wrong device, a hacker/cracker executes an exploit and unexpectedly crashes a server, an employee steals a device. The most common threat is users in an organisation especially contractors including cleaning staff.…

    • 3805 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Wyman, B., Scrivens, W., Hoffman, P., & Spitzner, L. (2013, Feb 01). Email Phishing Attacks. Retrieved from SANS Institute:…

    • 1074 Words
    • 5 Pages
    Better Essays
  • Better Essays

    spoofing

    • 2478 Words
    • 10 Pages

    The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet.…

    • 2478 Words
    • 10 Pages
    Better Essays
  • Satisfactory Essays

    Types of Network Attacks

    • 339 Words
    • 2 Pages

    Man-in-the-middle : Man-in-the-middle attacks occur when an attacker successfully inserts an intermediary software or program between two communicating hosts. The intermediary software or program allows attackers to listen to and modify the communication packets passing between the two hosts. The software intercepts the communication packets and then sends the information to the receiving host. The receiving host responds to the software, presuming it to be the legitimate client.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 7 Notes

    • 1579 Words
    • 7 Pages

    Spoofing – when you go on somebody’s link and realize that the name on the link is very different. Opens to identify, etc. always hover over links to verify that they match.…

    • 1579 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Cause Network

    • 571 Words
    • 3 Pages

    Another is cause is piracy. If hackers want to pirate anything that is stored in your network or computer, they will hack your computer network. For instance, a movie, instead of paying for it and waiting for it to go on cd, hackers could steal and pirate that movie file from you.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Facebook Hacking

    • 686 Words
    • 3 Pages

    having his or her personal information stolen by hackers. Hackers can be identified as numerous…

    • 686 Words
    • 3 Pages
    Good Essays

Related Topics