logo

Network Security - Major Incidents and Predictions for 2018

   

Added on  2023-06-15

6 Pages1818 Words189 Views
 | 
 | 
 | 
Name of the Student
Network Security -- Private Communication in a Public World
Network Security - Major Incidents and Predictions for 2018_1

1Name of the Student
The report has a specific focus on the network security related to the real world. In
this report, six major incidents of the recent year will be discussed. The content of the
incident will be categories with the significance, cost, impact, frequent occurrence, technical
nature of the attack. Finally, the analysis will be done regarding the attacks that are similar
and provide with information predicted for 2018
Rev 1: February 25, 2017
Cloudbleed:
Significance- The significance of Cloudbleed is that it kept user’s sensitive information at
stake. The information of users including passwords from Cloudflare organisation was leaked
to thousands of websites (Holland, 2017). It caused revealing of private information of
Cloudflare customers on the almost 3,400 websites.
Impact- The impact of CloudFlare was devastating, but it was minimal as it leaked private
information such as photos or videos of users (Holland, 2017). The introduction of vulnerable
HTML parser contributed in affecting almost 180 sites. The Cloudbleed affected users as it
was going on for a long time.
Frequent occurrence- The occurrence of this type of attack is less if it is detected quickly
and this type of attack cannot occur very frequently.
Technical nature- The technical nature of this attack is that it leaked user’s private
information such as username and password on several websites.
Analysis-
The attacks similar to Cloudbleed is Heartbleed which affected almost half of million
websites (Nieva, 2014). The Heartbleed attack was vulnerable, and attackers can gain access
to data servers on OpenSSL software.
The prediction of Cloudbleed attack in 2018 is that CloudFlare should be aware of its
security activities. They should adopt and implement potential strategies to mitigate the
similar risks in future.
Rev 2: January 02, 2018
Data Breaches:
Significance- The significance of Data Breaches is that the information of the personal
identification can be obtained through identity criminals.
Impact- If the user responded to the data breaches then it will impact the identity crime of
the incidence.
Frequent occurrence- Frequent notification has seen in the United States and the overseas
legislatures regarding the data breaches. Currently, the Australian Government made it
mandatory for the notification of data breach process (2017 Data Breach Investigations
Report, 2018).
Technical nature- The technical nature of the attack is that through personal information
data such as date-of-birth, social security number and more can be a breach and stole.
1
Network Security - Major Incidents and Predictions for 2018_2

2Name of the Student
Analysis- In the year 2017, the Equifax credit reporting agency faced a cyber-attack in which
half of the U.S populations’ date of birth, social security number and other data are stolen
(Berghel, 2017). It is a stark reminder from the hackers as it seems that they are thinking
something big. There are a lot of sensitive information that the company hold. As per the
security expert Marc Goodman who is the also an author of Future Crimes have a view that
the data brokers hold information about the habits of people’s through personal Web
browsing as this is the most popular targeted site.
Rev 3: December 27, 2017
Phishing Attack:
Significance- In this attack, the attacker usually sends an email to the user who seems to be
from someone that the user know about (David Marshall, 2018). It seems that the email is
legitimate that has some urgency. There is an attachment in the email that either open or has a
link to click.
Impact- If the user opens the malicious attachment then the malware gets installed on the
user’s computer system. Once the user clicks on that link, a legitimate website open on the
screen requesting a login and get access to all important files which is a trap.
Frequent occurrence- In 2017, Google Docs phishing attacks had frequently hack or spoof
to steal the corporate data and credentials.
Technical nature- The technical nature of the attack is that through malicious email the
attack gets install to user’s computer and hacker easily get the access to confidential
information.
Analysis- In 2018, the schemes of phishing is much sophisticated. Incredible techniques are
used that are well disguised by a cybercriminal.
Rev 4: April 11, 2018
Malware attack:
Significance- The significance of this attack is that there is a pop up of an antivirus alert on
the user screen which is a malware (Sehgal, 2018). If the user clicks on the malicious
attachment of the email, then there is a close chance that malware attacks have entered the
system.
Impact- Through malware, attackers gain hold over the users’ computers. Malware takes
control of the machine and monitor the actions and keystrokes and send all confidential data
from the user computer or network to the attacker’s computer (Giles, 2018).
Frequent occurrence- Frequently occurring malware are Trojan horses, spyware, worms,
viruses, adware that are seen on the user’s computer.
Technical nature- the attacker get complete control and access to the user’s computer
Analysis-
In the Cisco 2018 Annual Cybersecurity Report, it has been discussed that after seen the
behaviour of the attacker for past 18 months they had analysed that the defender can stop the
attack if they can know about the attack when it is coming and protect their devices.
2
Network Security - Major Incidents and Predictions for 2018_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Case Study on Cyber Attack - CJ4472
|13
|3128
|148

Software-Defined Networking for Data Breach Prevention: A Case Study of Myspace
|7
|1421
|457

Internet of Things (IoT) Framework for Enhanced Security: A Case Study of the Equifax Data Breach
|7
|1392
|478

Report on Information Security Breaches 2017
|12
|2809
|29

Information Security : Report
|6
|1099
|169