logo

Computer Network and Security - Assignment

   

Added on  2019-09-30

8 Pages1292 Words197 Views
Running Head: Computer Security 1Computer Network and Security

Computer Security 2ContentsAnalysis of threat landscape............................................................................................................3Coin mining attacks.....................................................................................................................3Mobile malware...........................................................................................................................3Spike on software.........................................................................................................................4Procedure in threat actor type..........................................................................................................4Exploit vectors and vulnerabilities threat actors..............................................................................4Exploit vectors.............................................................................................................................4Vulnerabilities threat actors.........................................................................................................5Advanced Persistent Threat.............................................................................................................5Specific tactics.............................................................................................................................5Tools.............................................................................................................................................6Objectives.....................................................................................................................................6References........................................................................................................................................8

Computer Security 3Analysis of threat landscape The threat landscape is continuously changing and adversaries are evolving to enhance the capabilities and stay ahead of defensive measures. As the companies are storing more data in the cloud and number of internet devices are continuously increasing. So the opportunity and appeal of cybercrime is also continuously increasing. But, technological advances have developed various new products and defense mechanism and those are continuously emerging throughout the years (Durbin, 2018). There are various threat landscapes in 2018 which are discussed below:Coin mining attacksCyber criminals are focused on the ransom ware for the generation of revenue which are giving new opportunities to them. During the last year 2017, the astronomical rise in the currency values due to various cyber criminals who are shifting to coin mining as the alternative source of revenue. In 2017, the coin mining gold rush which result an increase in the detection ofcoin minors on computers. Cyber criminals are stealing computer processing power and CPU storage with the help of coin minors. There are various impacts of this kind of cyber crime i.e. overheating batteries, slowing down devices and rendering devices unusable. Along with this, corporate networks are also at the risk of shutdown. There can also be financial implications for the organizations who find themselves for cloud CPU used by coin miners. These are also knownas supply chain attacks. The attack has increased by 600 percent as compared to 2017; it means that cyber criminals are continuously increasing (Symantec, 2018). Mobile malwareThreats of mobile malware are also growing continuously in every year. The number of new malware attacks is increased by 54 percent in 2018 as compared to 2018. Last year, around 24,000 malicious mobile were blocked every day. With the increment of threats, the problems are also increasing by the continuous use of older operating system. In the android mobile phones, 20 percent of devices are running with the newest version and only 2.3 percent are on latest releases. Further, users are facing privacy risks from the malicious activities and these can be problematic. These malwares leak the phone numbers of devices and this problem is increasing every day (Cisco, 2018).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity Essay ( cryptocurrency mining )
|5
|904
|80

Crypto-currencies and Cybercrime
|11
|3351
|115

Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227

Information Security Assignment Sample (pdf)
|10
|3084
|33

Cyber Security Assignment PDF
|9
|2867
|2114

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491