Your contribution can guide someone’s learning journey. Share your
documents today.
R Cyber Security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 Cyber security Table of Contents Introduction...........................................................................................................................................1 Different types of "hats" worn by the cyber security hacker..................................................................1 Motivations and ideologies....................................................................................................................1 Impact on an organization by various types of cyber warfare tools used...............................................1 Impact of network security risks on an organization.............................................................................2 Methods and tactics used for carrying out cyber warfare.......................................................................2
2 Cyber security Introduction Cyber security is important nowadays as all the organisation relies over network for data packets. This report covers different type of hats that are worn by hackers. The impact of cyber warfare tools on the network has been analysed. In this report the methods used for carrying out the cyber warfare has been discussed. Different types of "hats" worn by the cyber security hacker Nowadays hackers are classified according to the hats worn by them. Hackers are a person who tries to read the sensitive information in the computer by destroying the network. In other words it can be sated that they try to gain unauthorized access on the system by destroying the information(Bridewellconsulting, 2017). There are variety of hackers and can be classified by the type of hat they are wearing. White hat-Hackers doesn’t gain the access of information for illegal use there are some good hackers in the world as well. White hat hackers are beneficial for an organisation has they try to remove the vulnerabilities by removing all the bugs and viruses(Adams & Makramalla, 2015). They work on understanding the vulnerabilities in the network and try to fix them. Black hat-Hackers wearing black hat has extensive knowledge regarding the paths through which they can enter in the network. They write down about malwares through which they gain access in the system. They affect the organisation by penetrating in the system and reading all the sensitive data which spoils the confidentiality of data. They try to gain all the financial and personal information(Adams & Makramalla, 2015). Grey hat-Unlike black hat hackers or white hat hackers, grey hat hackers do not cause any harm nor do they protect the network. They just spend their time by working o the network. They are somewhere harmful for an organisation as they turn up in forming hacking community. Motivations and ideologies The motivation behind hacking and wearing hats is using the computer resources and other networks. The ideologies used by hacker’s are a complex process as they try to access the software’s by collecting all the valuable information. The black hats hackers uses side door to enter the system and are important data packets(Gupta, Agrawal & Yamaguchi, 2016). The white hat hackers on the other hand protect the network so that no one cause harm over the network. The motivation of these hackers is just to find ways and get unauthorized access of information. Impact on an organization by various types of cyber warfare tools used Cyber ware is an attack that is caused by one to another party to destroy the security measures. Hackers use various types of tools to access the information by disrupting the
3 Cyber security activities of an organisation(Ben-Asher & Gonzalez, 2015). Some of the tools are malwares; viruses, spyware and attacks like denial of service, phishing attack and brute force attack are used by hackers to read the data packets. These attacks are tools are found to be dangerous for an organisation as they violet the confidentiality, availability and integrated of data packets. The organisation is impacted by these tools as all their confidential records are not safe and are easily accessible by malicious users which in turn destroy the trust. Impact of network security risks on an organization An organisation is affected by the security threats as it affects the privacy of network Most of the data is stored on the networks thus the security of network could not be compromised. The violation of network security impacts the organisation by decreasing the overall performance(Marsh, 2017). Data harvesting is the major problem as illegal user’s access the information and they transfer the data to some other users. The organisation might suffer from issue of connecting more employees as cybercrimes increases and also increasing sources of data breaches. Methods and tactics used for carrying out cyber warfare The cyber warfare can be caused by various methods: Hacking- In this some unauthorised users gain the access the hardware or software which weakens the security of a network (Nord, 2017). Theft of data packets- This happens when the information is modified or altered so that privacy of data packets is lost. Email bombing-This is another form of causing cyber warfare as it addresses the network by overloading the email which ultimately affects the performance of a network. Data diddling-It involves changing of data after the result has been generated. This is done by adding intrusion in the system (Nord, 2017). Denial of attack-In this the services are made unavailable to the authorised user which in turn leads the authorised users with many requests. Viruses-These are the programs that are inserted in the network that affect the channels. They either erase important data or modify them. Trojan attack-These attacks are unlawful as they allow the users to gain the control over another system.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4 Cyber security References Adams, M., & Makramalla, M. (2015). Cybersecurity skills training: an attacker-centric gamified approach.Technology Innovation Management Review,5(1). Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection.Computers in Human Behavior,48, 51-61. Bridewellconsulting.(2017).7 Types Of Hackers You Should Know About.Retrieved from https://www.bridewellconsulting.com/the-bridewell-of-knowledge/7-types-hackers-know/. Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016).Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global. Marsh, D. (2017).Are Ethical Hackers the Best Solution for Combating the Growing World of Cyber-Crime?(Doctoral dissertation, University Honors College, Middle Tennessee State University). Nord.R.(2017).WHAT IS CYBER WARFARE AND HOW DOES IT WORK?.Retrieved fromhttps://socialunderground.com/2016/11/cyber-warfare-work/.