ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Cyber security : Assignment PDF

Verified

Added on  2021/06/15

|5
|1139
|160
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
R
Cyber Security

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
Cyber security
Table of Contents
Introduction...........................................................................................................................................1
Different types of "hats" worn by the cyber security hacker..................................................................1
Motivations and ideologies....................................................................................................................1
Impact on an organization by various types of cyber warfare tools used...............................................1
Impact of network security risks on an organization.............................................................................2
Methods and tactics used for carrying out cyber warfare.......................................................................2
Document Page
2
Cyber security
Introduction
Cyber security is important nowadays as all the organisation relies over network for
data packets. This report covers different type of hats that are worn by hackers. The impact of
cyber warfare tools on the network has been analysed. In this report the methods used for
carrying out the cyber warfare has been discussed.
Different types of "hats" worn by the cyber security hacker
Nowadays hackers are classified according to the hats worn by them. Hackers are a
person who tries to read the sensitive information in the computer by destroying the network.
In other words it can be sated that they try to gain unauthorized access on the system by
destroying the information (Bridewellconsulting, 2017). There are variety of hackers and can
be classified by the type of hat they are wearing.
White hat- Hackers doesn’t gain the access of information for illegal use there are some
good hackers in the world as well. White hat hackers are beneficial for an organisation has
they try to remove the vulnerabilities by removing all the bugs and viruses (Adams &
Makramalla, 2015). They work on understanding the vulnerabilities in the network and try to
fix them.
Black hat- Hackers wearing black hat has extensive knowledge regarding the paths through
which they can enter in the network. They write down about malwares through which they
gain access in the system. They affect the organisation by penetrating in the system and
reading all the sensitive data which spoils the confidentiality of data. They try to gain all the
financial and personal information (Adams & Makramalla, 2015).
Grey hat- Unlike black hat hackers or white hat hackers, grey hat hackers do not cause any
harm nor do they protect the network. They just spend their time by working o the network.
They are somewhere harmful for an organisation as they turn up in forming hacking
community.
Motivations and ideologies
The motivation behind hacking and wearing hats is using the computer resources and
other networks. The ideologies used by hacker’s are a complex process as they try to access
the software’s by collecting all the valuable information. The black hats hackers uses side
door to enter the system and are important data packets (Gupta, Agrawal & Yamaguchi,
2016). The white hat hackers on the other hand protect the network so that no one cause harm
over the network. The motivation of these hackers is just to find ways and get unauthorized
access of information.
Impact on an organization by various types of cyber warfare tools used
Cyber ware is an attack that is caused by one to another party to destroy the security
measures. Hackers use various types of tools to access the information by disrupting the
Document Page
3
Cyber security
activities of an organisation (Ben-Asher & Gonzalez, 2015). Some of the tools are malwares;
viruses, spyware and attacks like denial of service, phishing attack and brute force attack are
used by hackers to read the data packets. These attacks are tools are found to be dangerous
for an organisation as they violet the confidentiality, availability and integrated of data
packets. The organisation is impacted by these tools as all their confidential records are not
safe and are easily accessible by malicious users which in turn destroy the trust.
Impact of network security risks on an organization
An organisation is affected by the security threats as it affects the privacy of network
Most of the data is stored on the networks thus the security of network could not be
compromised. The violation of network security impacts the organisation by decreasing the
overall performance (Marsh, 2017). Data harvesting is the major problem as illegal user’s
access the information and they transfer the data to some other users. The organisation might
suffer from issue of connecting more employees as cybercrimes increases and also increasing
sources of data breaches.
Methods and tactics used for carrying out cyber warfare
The cyber warfare can be caused by various methods:
Hacking- In this some unauthorised users gain the access the hardware or software which
weakens the security of a network (Nord, 2017).
Theft of data packets- This happens when the information is modified or altered so that
privacy of data packets is lost.
Email bombing- This is another form of causing cyber warfare as it addresses the network
by overloading the email which ultimately affects the performance of a network.
Data diddling- It involves changing of data after the result has been generated. This is done
by adding intrusion in the system (Nord, 2017).
Denial of attack- In this the services are made unavailable to the authorised user which in
turn leads the authorised users with many requests.
Viruses- These are the programs that are inserted in the network that affect the channels.
They either erase important data or modify them.
Trojan attack- These attacks are unlawful as they allow the users to gain the control over
another system.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
Cyber security
References
Adams, M., & Makramalla, M. (2015). Cybersecurity skills training: an attacker-centric
gamified approach. Technology Innovation Management Review, 5(1).
Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack
detection. Computers in Human Behavior, 48, 51-61.
Bridewellconsulting. (2017). 7 Types Of Hackers You Should Know About. Retrieved from
https://www.bridewellconsulting.com/the-bridewell-of-knowledge/7-types-hackers-know/.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on modern
cryptographic solutions for computer and cyber security. IGI Global.
Marsh, D. (2017). Are Ethical Hackers the Best Solution for Combating the Growing World
of Cyber-Crime? (Doctoral dissertation, University Honors College, Middle Tennessee State
University).
Nord. R. (2017). WHAT IS CYBER WARFARE AND HOW DOES IT WORK?. Retrieved
from https://socialunderground.com/2016/11/cyber-warfare-work/.
1 out of 5
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]