logo

Cyber Security: Attacks and Mitigation Techniques

11 Pages2291 Words301 Views
   

Added on  2023-06-07

About This Document

This essay discusses cyber security, its definition, probable attacks to computer systems, and proper mitigation techniques. It also covers the benefits, negatives, and future developments of cyber security.

Cyber Security: Attacks and Mitigation Techniques

   Added on 2023-06-07

ShareRelated Documents
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author’s Note:
Cyber Security: Attacks and Mitigation Techniques_1
1
CYBER SECURITY
Part A
Abstract
The main aim of this essay is to know about cyber security and many other attacks. Cyber
security is the collection of processes, practices and technologies that help in protecting
networks, programs, data and devices from the several damages, attacks and unauthorized
access. The most significant strategies of cyber security majorly involve incident
management, risks management and identity management. This cyber security encompasses
the various software as well as hardware technologies and could be specifically applied at
each and every level. The major attacks of cyber security are DoS attacks, backdoor, direct
access attacks and many others. However, these attacks could be removed with proper
mitigation techniques. This essay has properly described the cyber attacks and mitigation
techniques for those attacks.
Cyber Security: Attacks and Mitigation Techniques_2
2
CYBER SECURITY
Introduction
Cyber security can be defined as the protectiveness of the Internet connected
computers that solely include software, data and hardware from the cyber attacks (Von Solms
& Van Niekerk, 2013). This security even consists of the physical security as well as cyber
security and these two types of security are utilized by the companies for the protection
against the unauthenticated accesses to the data centres or any other computerized system.
The information security that is being designed for the perfect maintenance of confidentiality,
availability as well as integrity of data, is the significant subset of cyber security. The major
elements of the cyber security for any particular information system are application security,
network security, operational security and many others (Wang & Lu, 2013). The following
essay outlines a brief discussion on the cyber security for any information system. The
various attacks related to cyber security, with their mitigation techniques will be given in this
report.
Discussion
Definition of Cyber Security
Cyber security major refers to the various preventative methodologies that are utilized
for the protection of confidential information or data from getting stolen, attacked or even
compromised (Hahn et al., 2013). There is a major requirement of the knowledge of various
information related threats like malicious codes or viruses. These levels mainly include
governmental, corporate and personal networks and devices. The passwords are the tools for
cyber security, which the individuals would be encountering regularly (Amin et al., 2013).
The other significant tools for cyber security majorly involve software for antivirus or anti
malware, firewalls, two factor authentications and encryption. The proper plan for the cyber
security is extremely important for all organizations.
Cyber Security: Attacks and Mitigation Techniques_3
3
CYBER SECURITY
Probable Attacks to Computer Systems
There are some of the major and the most significant attacks that are vulnerable for
any computer system (Buczak & Guven, 2016). These attacks are listed below:
i) Backdoor: The backdoor within a specific computer system, an algorithm or even a
cryptosystem is the subsequent secret methodology for bypassing the various security
controls or normal authentication. These types of systems eventually exist for several reasons,
which include poor configuration or original designing (Ning, Liu & Yang, 2013). The
legitimate access is being blocked by the attacker and this is done for various malicious
reasons.
ii) Denial of Service Attacks: The next significant attack that is extremely vulnerable
for the cyber security is the denial of service attack. This type of attack is eventually designed
for the purpose of making the network resource as well as machine completely unavailable
for the respective intended users (Elmaghraby & Losavio, 2014). The attackers could easily
deny the services to the specific victims like deliberately entering of wrong passwords for
significantly causing the accounts of the victims to be locked. The capabilities of the network
and machine are overloaded and then the users are subsequently blocked. The network attack
from the single IP address could be easily blocked by the addition of new firewall rules.
iii) Direct Access Attacks: The unauthorized user, who could easily gain the physical
access to any system, has the core ability for copying data from this system. These
unauthorized users even compromise of security by simply making certain modifications of
operating systems, installation of software worms, covert the listening devices and many
more (Dunn Cavelty, 2013). The trusted platform module as well as disk encryption are
eventually designed for the proper prevention of these attacks.
Cyber Security: Attacks and Mitigation Techniques_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Management: Cyber Security
|20
|4610
|231

Cyber Security: Threats, Challenges, and Mitigation Strategies
|12
|3967
|307

Cyber Security: Analyst, Policy, and Recommendations for Skyward Co
|10
|1963
|53

Cyber Security
|4
|820
|48

Professional Skills In Information Communication Technology: Cyber Security
|12
|3882
|66

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1577
|381