This study focuses on various cybersecurity issues and hacking threats, including phishing scams, ransomware, malware, denial of service attacks, and zero-day vulnerabilities. It explores prevention methods and solutions to overcome these threats.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Hacking and Cybersecurity1 HACKING AND CYBERSECURITY by (Name) The Name of the Class (Course) Professor (Tutor) The Name of the School (University) The City and State where it is located The Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Hacking and Cybersecurity2 Hypothesis/ Problem statement There is an advancement in technology in the world today, and security remains the primary concern of the systems and their technological advancement since there is a steady rise in visibility of cybersecurity issues and hacking advancing day by day. In this study, the researchers looked at various cybersecurity issues and hacking that are a threat to most of the systems and the solutions to overcome them. Phishing Scams is one of the cybersecurity issues that involves an attempt to access personal information of an individual like passwords and credit card details for malicious use. Hackers send emails that seem to be correctly from known sources. Scammers appear to be transparent and only users who have wide knowledge about security will be able to identified. Attacks clone the password with a legitimate text to trick users to access their credentials. Prevention to these scams involve identification of suspicious emails by verifying their source of before proceeding to open the documents attached to them, avoiding click to links attached with the email that you are not sure of and maintain the security through installing of antivirus software (Buchanan, B. 2016). Through use of ransomware which is a malicious software that try to encrypts user’s data and freezes such that it becomes invisible to the user while the attacker demands for payment to decrypt the information to be available for user. To overcome this always have a backup of the system in a different location so as to avoid blackmail (Lewis, J.A. 2013). Malware refers to sending malicious threats, that either comes from Trojan horses or spyware in different forms. Keeping antivirus software updated and frequent scanning of the systems helps to reduce the risk of this type of attack.
Hacking and Cybersecurity3 Denial of service is a form of cybersecurity attack where the attacker invades into the system or its resource through the network and temporarily makes the services unavailable to the users. Denial of service is saturating the system with requests that attempting to overload systems and prevent rights from being satisfied. By combining traffic congestion, these attacks disrupt service for real users over the networks. Denial of service can be prevented by reducing the impact of an attack. The user should have the capacity to monitor the system from any attack and mitigate the risks. Through use of automated techniques such as scrubbing and blackholing help to removes traffic (Byres, E. & Lowe, J. 2004). Zero-day vulnerability is a loophole in software that is not known by the user. Hackers make use of this security loophole to exploit the system before its known by the users. Through implementation of firewalls and use antivirus software help to secure the system from this kind of attack. Use of real time protection software deployed like intrusion detection and prevention systems that which offer full protection and response to immediately to any noted threat. Mechanisms inplimented in the network that prevent spread of that threat over the systems in the network (Orji, U.J. 2012). Reference List Buchanan, B., 2016.The cybersecurity dilemma: Hacking, trust, and fear between nations. Oxford University Press. Lewis, J.A., 2013.Raising the bar for cybersecurity. Center for Strategic and International Studies. Byres, E. and Lowe, J., 2004, October. The myths and facts behind cyber security risks for industrial control systems. InProceedings of the VDE Kongress(Vol. 116, pp. 213-218).
Hacking and Cybersecurity4 Orji, U.J., 2012.Cybersecurity Law and Regulation(pp. 398-400). Wolf Legal Publishers.