logo

ICT Ethical Hacking CMIT 321

   

Added on  2019-09-30

8 Pages1551 Words174 Views
Running Head: ICT Ethical hacking (exploits)CMIT 321 ExecutiveProposal Project

2ICT Ethical hacking (exploits)Table of ContentsIntroduction:...............................................................................................................................3Purpose of the executive proposal:............................................................................................3Overview of solution:.................................................................................................................4Summary:...................................................................................................................................6References:.................................................................................................................................7

3ICT Ethical hacking (exploits)Introduction:Medical Solutions Systems is one of the medical research and development organizations which have gained its success within a short tenure of five from its inception. The company has been able to achieve unprecedented success and it is going to be one of the major players in the industrial sector of research and development. Its business has also been growing and the success of the company has attracted many of the cyber-hackers. The company needs to increase its network in respect of security as it wants to expand its business network. The report entails the abilities to evaluate and research on the security testing software and to importance of the practice standards which the organization needs to understand. Purpose of the executive proposal:Medical Solutions Systems has gained its desired success in a short while and its remarkable success has become the target for many cyber-hackers. In the last 9 months the company has been under many of the Denial of Service of DOS hacking and cyber attacks. The reputation of the company has been in stake because of this hacking and the cyber attacks which have affected its normal business conducts. The cyber attacks could have major negative impacts on the business of the company [ CITATION key181 \l 1033 ]. The Denial of Service of DOShacking and cyber attacks and DDoS or Distributed Denial of Service are now two of the major and common cyber attacks which have impacted the computer networks. The main aimof these kinds of cyber hacking is to make the authorised users to lose their access to the resources of the networks and the access to the machines. The DDoS or Distributed Denial of Service attacks take place when any single system of the users gets hacked or attacked by the attackers from a local network or any internationally distributed network. The informationsystem gets affected by these kinds of attacks. There is a need for the planning for risk

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Extortion Hack: Types, Effects and Prevention Methods
|9
|1842
|92

Case Study on Qatar National bank attack Assignment PDF
|8
|1805
|395

Mitigation Strategies for Distributed Denial of Service (DDoS) Attack
|7
|1857
|53

Hackers Without Borders: A Legal Response
|11
|2715
|251

Security threats in cloud computing and preventive methods
|9
|2288
|116

DoS and DDoS: Modern Cyber-Attacks and Future Research
|3
|2615
|42