Cyber-Security: Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security

Verified

Added on  2022/11/23

|11
|1381
|117
Presentation
AI Summary
This presentation covers the basics of Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security. It also provides information on how to protect data and software using IT security solutions.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber-Security

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
What is Phishing ?
The term phishing was coined from the notorious generations of hackers in the 1960s-
1970s. The phone phreaks started a long standing tradition of cyber warfare which was
hilarious by blowing a toy whistle into phone receivers aiming to mimic a hertz tone.
The whistle tricked phone companies into switching the circuits giving the phreaks a
free chance to call.
This was a hacking innovation at that time but might sound ridiculous for us today but it
exploited vulnerability in free call switches which largely relied on in band signaling
(Abomhara, 2015).
Phishing is a hacking technique that which is the digital equivalent of net casting. It is a
trap and specifically occurs when an email is send that is designed to bait and lure a
user into clicking on the link or the URL.
The URL lands to a page that sends up to a known brand name such as Microsoft.
The purposes of the web form is to extract personal information without the user’s
knowledge such as the login credentials (AlDairi, 2017).
Document Page
Spear Phishing
Spear Phishing on the other hand is similar phishing but the attacker in this
one is after something in particular.
Spear phishing targets an individual and not a large net of consumers.
Hackers in spear phishing pretend to know you in person. It’s more of a
friend scamming you.
It may include a business email compromised to show one as a senior
employee of the company, for example a bank manager requesting their
junior to wire direct transfers to fraudulent companies (Essa, et al,2018,).
The hacker impersonates people you know and engages in social
engineering.
The attacker reaches this by researching the target on the social media
platforms or getting information from data breaches using P2P protocols
like Torrent.
Document Page
Ransomware
It is a malware that tries to force or frighten end computer users into
paying ransoms by restriction of their access to devices that have
been infected by the malware or threatening legal action.
Ransom ware can cause the affected computer to be completely
inoperable.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Scareware
Is a form of a computer malware that uses social engineering to
cause anxiety, shock or a perception to threat for the attacker to
manipulate users into buying software that that may not want (Amini,
et al 2015).
A comprehensive solution to the problems of information security is
provided by the DLP system.
KIB Search Inform controls the maximum number of data
transmission channels and provides the company's information
management service with a large set of tools for internal
investigations.
Document Page
Enterprise Information Security: Key
Threats and Remedies
A multi-layered scheme for protecting data and software using IT
security solutions makes it possible to reduce the risks of cyber-
attacks on business to a minimum and thereby eliminate the
unexpected costs of eliminating the consequences.
View data security solutions.
Anti-DDoS service is designed to prevent disruptions in online service
and downtime due to cyber-attacks on the communication channel or
directly on the company's resource.
More information about the protection service. The disaster recovery
plan is designed to reduce the risks associated with the unavailability
of company data leading to slower business processes
Document Page
Cont….
To reduce the risk of losing corporate information, you can use the
service of backing up data and storing them in cloud services based
on large data centers.
More information about the benefits of the service (Pan, et al,2017).
Providing comfortable working conditions and, therefore, reliable
protection of the company means, among other things, finding the
best IT solutions taking into account the peculiarities of the client’s
business area.
Where can I order information security services? Everyone knows the
saying "Who owns the information, he owns the world." And who
owns information about competitors, gets unprecedented advantages
in the fight against them.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cont…
Progress has made companies dependent on information systems,
and at the same time vulnerable to hacker attacks, computer viruses,
human and government factors, to the extent that many business
owners can no longer feel safe.
The issue of information security is becoming a cornerstone in the
organization’s activities, but the same progress offers solutions that
can protect data from external attacks.
As a result, as of September 8, 2017, bureau shares fell by 13% . It
also happens that a leak harms the company several months or years
after it has occurred, falling into the hands of competitors or
journalists (Rasekh, et al,2016). That is why protection should be
comprehensive.
Document Page
Cont….
Most often, financial documents, technological and design
developments, logins and passwords for entering the network of
other organizations “flow away” from companies.
But serious personal information leakage can also cause serious
personal injury.
This is especially true for Western countries, where lawsuits due to
such leaks often lead to huge fines, after the payment of which
companies incur serious losses.
This is interesting. In July 2017, one of the largest leaks of personal
data occurred at Equifax in the USA. More than 143 million
consumers, 209,000 credit card numbers, fell into the hands of
intruders.
Document Page
Conclusion
It is not necessary to divide the information into very important and less
important.
Everything related to the activities of the company and is not intended for
publication must remain within the company and be protected from threats.
According to the study, the media published 213 cases of information leaks
from government agencies and companies, which is 14% of the global
number of leaks.
The most frequent cases are leakage of payment information and personal
data - 80%. In 68% of cases, employees of organizations are guilty, and only
in 8% - management (Rid, & Buchanan, 2015).
Compared to 2015, the number of leaks increased by 89%.
Today, banks ranks second after the technological companies in the list of
organizations most affected by information leaks.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
AlDairi, A. (2017). Cyber security attacks on smart cities and associated mobile
technologies. Procedia Computer Science, 109, 1086-1091.
Amini, L., Christodorescu, M., Cohen, M. A., Parthasarathy, S., Rao, J., Sailer, R., ... & Verscheure,
O. (2015). U.S. Patent No. 9,032,521. Washington, DC: U.S. Patent and Trademark Office.
Essa, A., Al-Shoura, T., Al Nabulsi, A., Al-Ali, A. R., & Aloul, F. (2018, August). Cyber Physical
Sensors System Security: Threats, Vulnerabilities, and Solutions. In 2018 2nd International
Conference on Smart Grid and Smart Cities (ICSGSC) (pp. 62-67). IEEE.
Pan, L., Zheng, X., Chen, H. X., Luan, T., Bootwala, H., & Batten, L. (2017). Cyber security attacks
to modern vehicular systems. Journal of information security and applications, 36, 90-100.
Rasekh, A., Hassanzadeh, A., Mulchandani, S., Modi, S., & Banks, M. K. (2016). Smart water
networks and cyber security.
Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1-2), 4-
37.
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]