logo

Cyber Security Threat Management | Assignment

   

Added on  2020-03-16

9 Pages2180 Words85 Views
Cyber security 1Cyber SecurityStudent’s NameProfessorInstitution AffiliationDate
Cyber Security Threat Management | Assignment_1
Cyber security 2 Cybersecurity threat management Cybersecurity are measures and activities which protect computers, computer networks, computer hardware and software and other elements of cyberspace from disruptionand attacks. An individual should understand the different forms of attacks that they are likely to encounter so as to put in the best level of security they can. There exist different threats facing cyber security. These threats include hacking among others as discussed below.HackingThere are different types of hacking i.e. the hacktivist, the black hat and the white hat.Most of the hackers follow a proper methodology in order to lessen the risk of being caught. Hackers perform a preliminary survey that is the pre-attack step whereby the hackers collect, identify and record details about the respective corporation or individual. Secondly, the hacker undertakes a scanning and listing process. In this process the novice hackers utilize powerless scanners to find holes in one’s network. The success of this process depends on thesecurity of the network that is being hacked (Wang and Lu, 2013 pg. 1366).The hacker proceeds to the next step provided a weak spot has been identified in the said network. In this step, the hacker tries to penetrate the network using the loop holes in the network. The network intruder spreads damage from system to system by infiltrating the weakness in one’s web server software. Their privilege escalates to a point where they get access to more resources and is mostly not noticed by administrators or users (O’Connell, 2012 pg. 198). This is not due to the negligence of such users, but it is due to the manner in which the hackers intrude their networks. In most cases, they use technical skills that are not easily noticed by any normal user.The hacker has to maintain control of the system once he/she has penetrated the network. The hacker specialist hides their presence in the web server and remain in control.
Cyber Security Threat Management | Assignment_2
Cyber security 3At this stage one is helpless and is left with the option to rebuild one’s entire system all over again. The hacker can do serious damage in this case where the hacker has access to the network but the network owners are unawares. Hackers uses this opportunity to steal crucial information from an organization which they can then use for monetary gains. At some point,it may not be just for monetary gains but some just hack into systems with an aim of causing disruptions.Most hackers make their own backdoors in which case they gain full access to the system or network. With these backdoors, they are capable of accessing the network just like any other authorized personnel in the said network. All event logs are deleted and they install their own files, which will then allow them to access the system without being noticed, and can never be traced in any way possible. Remote Access Trojans can be used remotely, whichis a highly destructive malware which is commonly known as RAT. By this stage, can we actually recover our system from the hacker who wants to sell it to the highest bidder on underground networks?Compliance with Cyber SecurityThe importance of rules in any civilization cannot be over emphasized. Among the basic rules in the computer world, is the rule against installing third party software on company systems (Javaid, Sun, Devabhaktuni and Alam, 2012 pg. 585) This rule is however, broken by most employees and thus puts the company’s computer systems at risk. This is a classic example of non-compliance with cyber security policies of a company. Employees who violate this rule should be punished accordingly and take responsibility of the damage caused by a cyber-attack caused by such behavior.Non-compliance to this policy includes things employees term as trivial. For instance,employees may log in to their social media accounts using the company’s computers. This
Cyber Security Threat Management | Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Speaking Cyber With Reference to Security Theories
|25
|4562
|16

Ethical Hacking and Penetration Testing
|3
|417
|96

Ransomware & Malware
|5
|581
|276

Security threats in cloud computing and preventive methods
|9
|2288
|116

Cyber Security Assignment 2022
|12
|2845
|22

Cyber security Attacks | Assessment 1
|7
|1374
|30