logo

Security Engineering: Cyber Security Threats and Impacts

   

Added on  2023-03-17

6 Pages1416 Words53 Views
 | 
 | 
 | 
Running head: SECURITY ENGINEERING
SECURITY ENGINEERING
Name of Student
Name of University
Author’s Note
Security Engineering: Cyber Security Threats and Impacts_1

1SECURITY ENGINEERING
Executive summary
Common categories of cyber security threats include Denial of service, Man in the
middle attack, phishing and spear phishing attacks, drive by attack, password attack and many
more. The provided categories of the attacks are categorized on the basis of their impact on
organizations. These attacks are deliberate attempt that is performed by a specific individual,
group of individuals or an organization in order to breach information system of a different
individual or a different organization. This is done in order to seek some benefit from disrupting
the network of a victim. Various cyber security categories have different impacts on an
organization and they are categorized accordingly. The Denial of service attack is considered as
the first priority because it is considered as the most vulnerable one, Man in the middle attack is
the second priority, Phishing attack is third, and drive by attack is fourth. Password attack is
considered as the fifth, SQL injection is sixth, Cross site scripting attack is seventh and
Eavesdropping attack is considered as the last priority. A cyber security category that should be
addressed with the organization includes Denial of service attack. The challenges that mobile as
well as cloud computing needs might bring to the organization include privacy and security,
alteration of network, limited energy source, service availability, low bandwidth and many more.
Among these challenges, low bandwidth is considered as the most vulnerable issue in the cloud
as well as mobile computing within an organization.
Security Engineering: Cyber Security Threats and Impacts_2

2SECURITY ENGINEERING
challenges impact
Denial of service The carrying out of denial of service attack is comparatively
inexpensive, but impacts that it has on the organizations could be
enormous. A medium sized denial of service attack that usually lasts
for around a day could be bought for almost $500 on dark web, this
particular figure pales when compared to the harm that has already
been done to the service operator who would find that the service is
not available for 24 hours (Almorsy, Grundy & Müller, 2016).
Along with direct and financial costs, the unavailability of the
damage that has been occurred to the reputation of the company
might have a severe effect in the long run.
Man in the middle attack The impacts that are posted by Man in the middle attack include
sniffing, malware, binary patching, cookie insertion and many more.
Sniffing is an act that deals with reading traffic as well as collecting
data (Borgohain, Kumar & Sanyal, 2015). Sniffing is usually used
for the purpose of stealing the confidential data that belongs to the
organization. The malware uses misleading advertisements for
tricking a particular user for installing the malware.
phishing and spear
phishing attacks
Phishing and spear phishing attacks cause reputational damage,
intellectual damage and many more. This attack tends to disclose the
embarrassing internal communications that had taken place within an
organization; this creates reputational damage to the organization
(Hossain, Fotouhi & Hasan, 2015). the organization also has chance
to face direct loss, the phishing and spear phishing attacks on various
employees might result in fines levied by various regulatory bodies
in the case of various breached which results in violations in the
Security Engineering: Cyber Security Threats and Impacts_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Attacks and Techniques
|14
|1105
|277

Network Security Issues and Security Model
|11
|1603
|450

Explanation of Meltdown and Spectre Vulnerabilities
|11
|3042
|21

(Solved) Cyber security challenges Assignment
|8
|2715
|216

Cyber Security Vulnerabilities and Recommendations for ABC Technology
|10
|3323
|1

Cyber Risk Management and Control: A Literature Review
|7
|1149
|80