logo

Computer Security: Fundamentals, Examples, and Countermeasures

15 Pages5240 Words98 Views
   

Added on  2023-01-12

About This Document

This document provides an overview of computer security, including its fundamentals, examples of threats, and countermeasures to protect systems. It also discusses key issues in computer security and explores different cyber security frameworks. The document is relevant for anyone interested in understanding and implementing effective computer security measures.

Computer Security: Fundamentals, Examples, and Countermeasures

   Added on 2023-01-12

ShareRelated Documents
Computer Security
Computer Security: Fundamentals, Examples, and Countermeasures_1
Table of Contents
Introduction......................................................................................................................................3
Task 1...............................................................................................................................................3
Analyse fundamentals of computer security and examples along with countermeasures......3
Task 2...............................................................................................................................................6
Recognise key computer security issues through usage of threat intelligence concept.........6
Task 3...............................................................................................................................................8
Assess cyber security frameworks for protection of systems from threat..............................8
Task 4.............................................................................................................................................10
Identification of distinct objects that are present in active directory for managing user account.
..............................................................................................................................................10
Task 5.............................................................................................................................................12
Describe code of conduct that is required by IT professionals............................................12
Conclusion.....................................................................................................................................14
References......................................................................................................................................15
Computer Security: Fundamentals, Examples, and Countermeasures_2
Introduction
Protecting data and computer system from unauthorised usage, theft and harm is defined as
computer security. It implies a process that can be used for preventing as well as detecting
unauthenticated usage of system (Basta and CISSP, 2013). Generally, this denotes control that is
placed for furnishing availability, confidentiality along with integrity of computer systems. This
involves controlling physical access for securing system against any kind of harm that is carried
out by data, network access and code injection. To understand the concept of computer security
Utility firm is considered whose website is attacked through botnet which is used for conducting
DDoS attacks, forward spam and allow third person to have access to devices on a network. This
report contains computer security elements along with preventive measures, key issues,
frameworks as well as examine active directory for their users. The code of conduct required by
IT professionals while working in organisation will also be discussed.
Task 1
Analyse fundamentals of computer security and examples along with countermeasures.
Anything that leads to loss of physical damage or kind of corruption to hardware or
infrastructure is defined as computer system threat. The risk which harms organisation as well as
systems is referred to as security threat. It is being conducted by either physical or non-physical
attacks that leads intruder to gain unauthorised access (Boyle and Panko, 2014). On the other
hand, incident which creates modifications or physical alterations within computer system
implies physical threat. For an instance stealing and making modifications to data contained in
system. Non-physical threat involves corruption of data, illegal tracking of actions, security
breaches that are conducted on computer system. This denotes that there is a requirement for
securing computer systems from malicious attacks which may lead to hamper services furnished
by organisation. For thi sit is necessary to analyse critical elements that creates impact.
With reference to Utility Firm’s website, Botnet attack was made for carrying out DDoS
attack along with other activities that are destructive for firm. As per the present scenario, the
major threat is to systems which are connected with each other on a network; this makes them
more vulnerable to attacks (Carroll, 2014). In this context some attacks or threats have been
illustrated below:
Computer Security: Fundamentals, Examples, and Countermeasures_3
Malware: This is a malicious program, software or a file that is harmful for computer
users that are developed with intent of damaging, stealing and creating a mess. It is
circulated through distinct methods. There exist various kind of malware like GhOst,
Kovter, ZeuS, CoinMiner, Emotet and various others. For this third person utilises
malware by making use of physical or virtual means for affecting devices present on the
network (Conklin and et. al, 2015). For an example malicious programs can be shared
through USB drives and also on internet through drive-by download which are being
automatically downloaded without any kind of permission from system users. For this, it
is important that appropriate countermeasures must be taken by Utility Firm; this
involves usage of antivirus and anti-malware solution, e-mail spam filters and endpoint
security measures. In addition to this, experts need to make sure that patches and cyber
security are updated on regular intervals and accordingly employees can be trained so
that they do not get involved into these activities unintentionally. They need to ensure
that clicks are not made on suspicious emails as well as restrict application privileges.
Distributed denial-of-service attack: It is malicious attempt that creates an influence on
services or traffic present on network and targeted server by flooding traffic present on
the internet. DDoS attacks are being made by making use of different compromised
system like a source for traffic attack. DDoS attack is responsible for checking out
confines on application resources, web servers and network by sending impales of
counterfeit traffic (What is a DDoS Attack, 2019). For an example attacks like short
bursts related with malicious pursuit on systems endpoints such as search function. For
this, intruder utilises army of zombie devices like botnet. The rationale behind this is to
slow down systems for legitimate users. The countermeasures that can used by Utility
Firm is that they can utilise website application firewall that will assist in keeping website
away from any kind of malicious traffic. Furthermore, Sucuri firewall can be installed
within system that will block countries from making communication among websites in
which attacks are conducted. Along with this, traffic has to be tracked for analysing their
peaks.
Phishing & social engineering attacks: The deceitful attempts which are made towards
elicit responsive data that is attained by victims by carrying out certain types of activities
is defined as phishing (Fisch, White and Pooch, 2017). Within this, activities comprises
Computer Security: Fundamentals, Examples, and Countermeasures_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security: Elements, Issues, and Frameworks
|15
|5037
|1

IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61

Importance of Cyber Security in Protecting Against Cyber Attacks
|26
|8270
|85

MIT141559 Botnet Analysis and Detection System Literature Review
|5
|1190
|91

Cyber Attacks: Types, Recent Incidents, Motivations, and Ransomware
|5
|1791
|347

Information Security Assignment Sample (pdf)
|10
|3084
|33