Computer Network and Security - Assignment

Added on - 30 Sep 2019

  • 8

    Pages

  • 1292

    Words

  • 109

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 8 pages
Running Head: Computer Security1Computer Network and Security
Computer Security2ContentsAnalysis of threat landscape............................................................................................................3Coin mining attacks.....................................................................................................................3Mobile malware...........................................................................................................................3Spike on software.........................................................................................................................4Procedure in threat actor type..........................................................................................................4Exploit vectors and vulnerabilities threat actors..............................................................................4Exploit vectors.............................................................................................................................4Vulnerabilities threat actors.........................................................................................................5Advanced Persistent Threat.............................................................................................................5Specific tactics.............................................................................................................................5Tools.............................................................................................................................................6Objectives.....................................................................................................................................6References........................................................................................................................................8
Computer Security3Analysis of threat landscapeThe threat landscape is continuously changing and adversaries are evolving to enhancethe capabilities and stay ahead of defensive measures. As the companies are storing more data inthe cloud and number of internet devices are continuously increasing. So the opportunity andappeal of cybercrime is also continuously increasing. But, technological advances havedeveloped various new products and defense mechanism and those are continuously emergingthroughout the years (Durbin, 2018). There are various threat landscapes in 2018 which arediscussed below:Coin mining attacksCyber criminals are focused on the ransom ware for the generation of revenue which aregiving new opportunities to them. During the last year 2017, the astronomical rise in thecurrency values due to various cyber criminals who are shifting to coin mining as the alternativesource of revenue. In 2017, the coin mining gold rush which result an increase in the detection ofcoin minors on computers. Cyber criminals are stealing computer processing power and CPUstorage with the help of coin minors. There are various impacts of this kind of cyber crime i.e.overheating batteries, slowing down devices and rendering devices unusable. Along with this,corporate networks are also at the risk of shutdown. There can also be financial implications forthe organizations who find themselves for cloud CPU used by coin miners. These are also knownas supply chain attacks. The attack has increased by 600 percent as compared to 2017; it meansthat cyber criminals are continuously increasing (Symantec, 2018).Mobile malwareThreats of mobile malware are also growing continuously in every year. The number ofnew malware attacks is increased by 54 percent in 2018 as compared to 2018. Last year, around24,000 malicious mobile were blocked every day. With the increment of threats, the problemsare also increasing by the continuous use of older operating system. In the android mobilephones, 20 percent of devices are running with the newest version and only 2.3 percent are onlatest releases. Further, users are facing privacy risks from the malicious activities and these canbe problematic. These malwares leak the phone numbers of devices and this problem isincreasing every day (Cisco, 2018).
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document