logo

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management

   

Added on  2023-04-25

10 Pages3587 Words73 Views
Data Science and Big Data
 | 
 | 
 | 
qwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiop
asdfghjklzxcvbnmqwertyuiopasd
fghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjkl
zxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnm
qwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwert
yuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiop
asdfghjklzxcvbnmqwertyuiopasd
fghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmrtyuiopasdfghjklzxcv
IT Networking Designing
Networking
Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management_1

Networking
Table of Contents
Answer 1...............................................................................................................................................2
Answer a............................................................................................................................................2
Answer b...........................................................................................................................................2
Answer c............................................................................................................................................3
Answer d...........................................................................................................................................3
Answer 2...............................................................................................................................................4
Answer 3...............................................................................................................................................5
Answer 4...............................................................................................................................................6
References.............................................................................................................................................8
1
Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management_2

Networking
Answer 1
Answer a
Malicious attacks are the security attacks that make use of malicious codes to create system
vulnerabilities and potential damages to the files, systems, and the networks. These attacks
comprise of malicious codes and web scripts to exploit the security vulnerabilities. There are
different forms of malware that may be used by the attackers to give shape to these attacks.
Some of the primary forms may include viruses, worms, Trojan horses, spyware, logic
bombs, adware, and ransomware. The malicious attacks provide the malicious attackers with
the ability to get an unauthorized remote access to the system which is referred as backdoor
entry (Xiong et al., 2017). The confidential and sensitive application information may get
exposed and may be misused by these malicious entities. There are various threat agents that
may be used to carry out these attacks. Computer networks are the primary threat agents that
may be used as the malware may be passed on to the data packets over the network. The use
of emails or other web links may also be used (Nguyen et al., 2014). Apart from the
malware-based attacks, cybersquatting and botnets are also some of the examples of the
malicious attacks. In case of the botnets, a network of infected internet-connected devices is
used to spread the malware (Balasooriya and Fernando, 2013). Distributed Denial of Service
(DDoS) attacks may be carried out through the botnets. Cybersquatting is the malicious
practice of using a domain name on the Internet with the ill-intent. It is primarily carried out
to deceive the users for executing malicious activities over the network, such as acquiring
private user information.
Answer b
Social Engineering attacks are the ones that are accomplished through human interactions
with psychological manipulation of the users to trick them for obtaining sensitive
information. There are several steps that are involved in these attacks. The first and the
foremost is the investigation by identifying the victims and collecting background details to
set-up the modes of attack(s) (Cletus and Najim, 2018). The second is to deceive the victims
by engaging the targets and taking the control of the entire process. The third step is to
execute the attack by obtaining information from the victims. The last step is to remove all
the traces and close the interaction. There are different techniques that are used to execute the
social engineering attacks. Phishing is one of the most common techniques in which
2
Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Research Proposal on Information Security Governance in the Financial & Banking Sector
|5
|798
|374

IoT Security & Privacy: Literature Review
|8
|1987
|72

IS security and Risk Management
|16
|4607
|284

CSI2102 - Information Security - Assignment
|11
|2643
|76

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

Risk Management for Kevin's Music: Security Threats, Probability-Impact Matrix, and Risk Controls
|8
|1573
|305