Preview

IS4560 Unit 1 Assignment 1

Satisfactory Essays
Open Document
Open Document
275 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS4560 Unit 1 Assignment 1
Randy Murphy
IS4560
Unit 1 Assignment 1

In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:
* Malicious code activity
* Tends to increase in countries experiencing rapid growth in broadband infrastructure and connectivity, , readily available malicious code kits are making it simple for attackers to mount attacks, the online underground economy and malicious activity are benefiting from the downturn in the global economy.
* Web-based targeted attacks on enterprises are increasing
* Targeted attacks using advanced persistent threats (APT )
* Designed to remain undetected in order to gather information over prolonged periods. This type of attack has been observed in other large-scale data breaches that caused large numbers of identities to be exposed
* Hacking attack using an SQL-injection attack
* The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.
* Researching publically available information about a company or its employees
* Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.
* Messages often contain attachments that exploit weaknesses in client-side applications, or links to websites that exploit vulnerabilities in Web browsers or browser plug-ins.
* A successful attack could give the attacker access to a company’s network.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is4796 Unit 1 Assignment

    • 370 Words
    • 2 Pages

    My company; RLR Securities Inc., has been in the security service since 2002 we started out with only four (4) people, now we have grown to twenty-two (22) people, RLR Securities Inc. was formed as a small corporation who’s focus was mainly on database performance tuning and security services for database applications. By 2006 we started providing complete security services, including assessments, penetration testing, policy creation, and regulatory compliance assistance.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    are also part of a comprehensive security program because they enable you to detect a…

    • 779 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet, and not normally identifiable from standard log file analysis. Most critically, an attacker can passively gather this information without ever coming into direct contact with the organizations servers – thus being essentially undetectable. Very little information has been publicly discussed about arguably one of the least understood, and most significant stages of penetration testing – the process of Passive Information Gathering. This technical paper and information gathering plan reviews the processes and techniques related to the discovery of leaked information. It also includes details on both the significance of the leaked information, and steps organizations should take to halt or limit their exposure to this threat.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mail may have confidential information. It may contain personal information about employees or contain business secrets such as names and other personal details of customers.…

    • 2175 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    (see Exhibit 2-1). The endpoint can only view the last proxy with which it is directly communicating and not any of the intermediary proxies or the original location.…

    • 1647 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Using software to guess company addresses and send them blank e-mails. Unreturned messages are valid addresses that are added to spammer e-mail lists.…

    • 1096 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Ethical Computer Hacking

    • 1026 Words
    • 5 Pages

    There are a many types of hacks, and hackers in the cyber world. A hack can be any modification done to virtually anything, to make it do something better, or something completely different. Many hackers are hackers of electronic equipment, mostly computers, but even cell phones, routers, iPods, digital cameras, and even the Toyota Prius have been hacked to get better gas mileage with the hybrid-electric engine (Rupley). But besides modifying computers themselves or gadgets, hackers play a significant role in the networking world.…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Besides the cultures in countries being targets for these attacks, the industry sees a large amount of these attacks as well (See figure below). It is because of these trends, that cyber terrorism is a growing concern.…

    • 2129 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Hacking and Cybercrime

    • 730 Words
    • 3 Pages

    The Symantec Global Internet Security Threat Report noted a shift in malicious activity to be emerging. The growing level of malicious code activity has also resulted in the proposal of a new cybercrime bill. Malicious activity tends to increase in rapid growth in broadband infrastructure and connectivity. In January 2010, reports emerged that dozens of large companies had been compromised by attackers using the Hydra Trojan. Typically, this type of attack begins with some reconnaissance on the part of attackers. Typically, this type of attack begins with some reconnaissance on the part of attackers. This can include publicly available information about the company and its employees, such as from social networking sites. This information is then used to create specifically crafted phishing email messages, often referred to as spear phishing, that target the company or even specific staff members. These email messages often contain attachments that exploit vulnerabilities in client-side application or links to websites that exploit vulnerabilities in web browsers or browser plug-ins. In 2009, 60 percent of identities exposed were compromised by hacking attacks. Which are another form of targeted attack. The hackers gained access to the company payment processing network using an SQL injection attack. The attackers then installed malicious code design to gather sensitive information from the network, which allowed them to easily access the network at their convenience. The attacks resulted in the theft of approximately 130 million credit card numbers. Web-based attacks have replaced the mass mailing worm in this position. Attackers may use social engineering, such as in spam messages, to lure a user to a website that exploit browser and plug-in vulnerabilities. These attacks are then used to install malicious code or other applications such as rogue security software on the victim’s computer. Four of the top five…

    • 730 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Email Security

    • 752 Words
    • 4 Pages

    Email security threats may be of many different types. Email security can be compromised by spoofing, identity theft, attacks by modifying existing messages, and imposters [Kangas, 2004]. Hackers may use any or all of these methods to break into a user's computer.…

    • 752 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Virus hunters

    • 809 Words
    • 4 Pages

    if your market shifted 30 times a day. The computervirus hunters at Symantec Corp. don’t have to…

    • 809 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    This kind of activity refers to sending large numbers of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing.…

    • 3472 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    waste disposal

    • 7404 Words
    • 24 Pages

    There is no disputing the facts... the number of hacking and intrusion incidents is increasing year on year as technology rolls out. Unfortunately in todays inter-connected e-commerce world there is no hiding place: you can be found through a wide variety of means: DNS, Name Server Lookup, NSlookup, Newsgroups, web site trawling, e-mail properties and so on.…

    • 7404 Words
    • 24 Pages
    Powerful Essays