Analysis of Cyber Security Threats in Security Engineering
VerifiedAdded on 2023/03/17
|6
|1416
|53
Report
AI Summary
This report, titled "Security Engineering," provides an executive summary of various cyber security threats and their impacts on organizations. It categorizes attacks based on their severity, with Denial of Service (DoS) as the highest priority, followed by Man-in-the-Middle, phishing, drive-by, password, SQL injection, cross-site scripting, and eavesdropping attacks. The report emphasizes the challenges posed by mobile and cloud computing, particularly low bandwidth, and details the financial and reputational consequences of DoS attacks. It further explores the impacts of Man-in-the-Middle attacks, including sniffing and malware. Phishing and spear phishing attacks are discussed in terms of reputational and financial damage. Drive-by, password, SQL injection, cross-site scripting, and eavesdropping attacks are also analyzed, detailing their methods and potential harms. The report concludes with a bibliography of cited sources.

Running head: SECURITY ENGINEERING
SECURITY ENGINEERING
Name of Student
Name of University
Author’s Note
SECURITY ENGINEERING
Name of Student
Name of University
Author’s Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1SECURITY ENGINEERING
Executive summary
Common categories of cyber security threats include Denial of service, Man in the
middle attack, phishing and spear phishing attacks, drive by attack, password attack and many
more. The provided categories of the attacks are categorized on the basis of their impact on
organizations. These attacks are deliberate attempt that is performed by a specific individual,
group of individuals or an organization in order to breach information system of a different
individual or a different organization. This is done in order to seek some benefit from disrupting
the network of a victim. Various cyber security categories have different impacts on an
organization and they are categorized accordingly. The Denial of service attack is considered as
the first priority because it is considered as the most vulnerable one, Man in the middle attack is
the second priority, Phishing attack is third, and drive by attack is fourth. Password attack is
considered as the fifth, SQL injection is sixth, Cross site scripting attack is seventh and
Eavesdropping attack is considered as the last priority. A cyber security category that should be
addressed with the organization includes Denial of service attack. The challenges that mobile as
well as cloud computing needs might bring to the organization include privacy and security,
alteration of network, limited energy source, service availability, low bandwidth and many more.
Among these challenges, low bandwidth is considered as the most vulnerable issue in the cloud
as well as mobile computing within an organization.
Executive summary
Common categories of cyber security threats include Denial of service, Man in the
middle attack, phishing and spear phishing attacks, drive by attack, password attack and many
more. The provided categories of the attacks are categorized on the basis of their impact on
organizations. These attacks are deliberate attempt that is performed by a specific individual,
group of individuals or an organization in order to breach information system of a different
individual or a different organization. This is done in order to seek some benefit from disrupting
the network of a victim. Various cyber security categories have different impacts on an
organization and they are categorized accordingly. The Denial of service attack is considered as
the first priority because it is considered as the most vulnerable one, Man in the middle attack is
the second priority, Phishing attack is third, and drive by attack is fourth. Password attack is
considered as the fifth, SQL injection is sixth, Cross site scripting attack is seventh and
Eavesdropping attack is considered as the last priority. A cyber security category that should be
addressed with the organization includes Denial of service attack. The challenges that mobile as
well as cloud computing needs might bring to the organization include privacy and security,
alteration of network, limited energy source, service availability, low bandwidth and many more.
Among these challenges, low bandwidth is considered as the most vulnerable issue in the cloud
as well as mobile computing within an organization.

2SECURITY ENGINEERING
challenges impact
Denial of service The carrying out of denial of service attack is comparatively
inexpensive, but impacts that it has on the organizations could be
enormous. A medium sized denial of service attack that usually lasts
for around a day could be bought for almost $500 on dark web, this
particular figure pales when compared to the harm that has already
been done to the service operator who would find that the service is
not available for 24 hours (Almorsy, Grundy & Müller, 2016).
Along with direct and financial costs, the unavailability of the
damage that has been occurred to the reputation of the company
might have a severe effect in the long run.
Man in the middle attack The impacts that are posted by Man in the middle attack include
sniffing, malware, binary patching, cookie insertion and many more.
Sniffing is an act that deals with reading traffic as well as collecting
data (Borgohain, Kumar & Sanyal, 2015). Sniffing is usually used
for the purpose of stealing the confidential data that belongs to the
organization. The malware uses misleading advertisements for
tricking a particular user for installing the malware.
phishing and spear
phishing attacks
Phishing and spear phishing attacks cause reputational damage,
intellectual damage and many more. This attack tends to disclose the
embarrassing internal communications that had taken place within an
organization; this creates reputational damage to the organization
(Hossain, Fotouhi & Hasan, 2015). the organization also has chance
to face direct loss, the phishing and spear phishing attacks on various
employees might result in fines levied by various regulatory bodies
in the case of various breached which results in violations in the
challenges impact
Denial of service The carrying out of denial of service attack is comparatively
inexpensive, but impacts that it has on the organizations could be
enormous. A medium sized denial of service attack that usually lasts
for around a day could be bought for almost $500 on dark web, this
particular figure pales when compared to the harm that has already
been done to the service operator who would find that the service is
not available for 24 hours (Almorsy, Grundy & Müller, 2016).
Along with direct and financial costs, the unavailability of the
damage that has been occurred to the reputation of the company
might have a severe effect in the long run.
Man in the middle attack The impacts that are posted by Man in the middle attack include
sniffing, malware, binary patching, cookie insertion and many more.
Sniffing is an act that deals with reading traffic as well as collecting
data (Borgohain, Kumar & Sanyal, 2015). Sniffing is usually used
for the purpose of stealing the confidential data that belongs to the
organization. The malware uses misleading advertisements for
tricking a particular user for installing the malware.
phishing and spear
phishing attacks
Phishing and spear phishing attacks cause reputational damage,
intellectual damage and many more. This attack tends to disclose the
embarrassing internal communications that had taken place within an
organization; this creates reputational damage to the organization
(Hossain, Fotouhi & Hasan, 2015). the organization also has chance
to face direct loss, the phishing and spear phishing attacks on various
employees might result in fines levied by various regulatory bodies
in the case of various breached which results in violations in the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3SECURITY ENGINEERING
HIPAA or the PCI. The overall cost incurred in the process of
protecting identities of customers or employees that have data stolen,
along with theft from the company itself could easily cost around
millions (Jokar, Arianpoo & Leung, 2016).
drive by attack In drive by attacks the cyber criminals concentrate on latching onto
various home networks and not just to access the internet but
especially to find their way badly in secured routers with the help of
working in an effective manner (Lin & Liao, 2017). They aim in
listening to the traffic and hence weaken the actual password as time
passes by. After the password id being compromised, the hacker has
a specific carte blanche in order to access machine along with adding
malware or any sort of key logger software, this enables the hackers
to wait till the users can access their bank (Pathan, 2016).
password attack Password attack can be occurred by various means, these means
include various dictionary attacks, offline detection, rainbow tables,
key logger attacks, spoofs, Trojans, social engineering, and many
more (Yang, Wu & Yin, 2017). Dictionary attacks are known as a
word based brute force attacks, here the hackers gain knowledge
regarding most common passwords that are used by the users; they
guess these passwords and hack the profiles of the users (Almorsy,
Grundy & Müller, 2016). The key logger attacks are occurred for the
same purpose, this malware sits hidden in a particular background
and records keystrokes when the keyboard is pressed, it logs mouse
movements or captures screenshots.
SQL injection attack SQL injection attack allows a particular hacker to view data that is
contained in database and then modify the content in it. It creates
HIPAA or the PCI. The overall cost incurred in the process of
protecting identities of customers or employees that have data stolen,
along with theft from the company itself could easily cost around
millions (Jokar, Arianpoo & Leung, 2016).
drive by attack In drive by attacks the cyber criminals concentrate on latching onto
various home networks and not just to access the internet but
especially to find their way badly in secured routers with the help of
working in an effective manner (Lin & Liao, 2017). They aim in
listening to the traffic and hence weaken the actual password as time
passes by. After the password id being compromised, the hacker has
a specific carte blanche in order to access machine along with adding
malware or any sort of key logger software, this enables the hackers
to wait till the users can access their bank (Pathan, 2016).
password attack Password attack can be occurred by various means, these means
include various dictionary attacks, offline detection, rainbow tables,
key logger attacks, spoofs, Trojans, social engineering, and many
more (Yang, Wu & Yin, 2017). Dictionary attacks are known as a
word based brute force attacks, here the hackers gain knowledge
regarding most common passwords that are used by the users; they
guess these passwords and hack the profiles of the users (Almorsy,
Grundy & Müller, 2016). The key logger attacks are occurred for the
same purpose, this malware sits hidden in a particular background
and records keystrokes when the keyboard is pressed, it logs mouse
movements or captures screenshots.
SQL injection attack SQL injection attack allows a particular hacker to view data that is
contained in database and then modify the content in it. It creates
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4SECURITY ENGINEERING
security and privacy concerns within the organization (Hossain,
Fotouhi & Hasan, 2015). In this hackers are allowed to gain more
number of privileges over the database. In some cases the hackers
also act as system administrator of the database server.
Cross site scripting attack Cross site scripting attack is considered as one of the most prevalent
high risk application vulnerability and it still is one of the most
overlooked by the developers as well as defenders. One of the most
common Cross sites scripting attack includes the hijack of account
that belongs to the users (Jokar, Arianpoo & Leung, 2016). This
done by stealing the session cookies of a user. This allows the
hackers for impersonating various victims and then accesses the
sensitive data or functionality.
Eavesdropping attack This particular attack is also known as snooping or sniffing attack, it
is also an intrusion where someone tries stealing data that computers,
smart phones and many more devices transmit over a particular
network (Lin & Liao, 2017). This attack makes the smart phones of
users very vulnerable to eavesdropping and involves authentication
tokens that are sent over an unencrypted network.
Table 1: issues with their impacts
security and privacy concerns within the organization (Hossain,
Fotouhi & Hasan, 2015). In this hackers are allowed to gain more
number of privileges over the database. In some cases the hackers
also act as system administrator of the database server.
Cross site scripting attack Cross site scripting attack is considered as one of the most prevalent
high risk application vulnerability and it still is one of the most
overlooked by the developers as well as defenders. One of the most
common Cross sites scripting attack includes the hijack of account
that belongs to the users (Jokar, Arianpoo & Leung, 2016). This
done by stealing the session cookies of a user. This allows the
hackers for impersonating various victims and then accesses the
sensitive data or functionality.
Eavesdropping attack This particular attack is also known as snooping or sniffing attack, it
is also an intrusion where someone tries stealing data that computers,
smart phones and many more devices transmit over a particular
network (Lin & Liao, 2017). This attack makes the smart phones of
users very vulnerable to eavesdropping and involves authentication
tokens that are sent over an unencrypted network.
Table 1: issues with their impacts

5SECURITY ENGINEERING
Bibliography
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of internet
of things. arXiv preprint arXiv:1501.02211.
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues,
challenges, and open problems in the internet of things. In 2015 IEEE World Congress on
Services (pp. 21-28). IEEE.
Jokar, P., Arianpoo, N., & Leung, V. C. (2016). A survey on security issues in smart
grids. Security and Communication Networks, 9(3), 262-273.
Lin, I. C., & Liao, T. C. (2017). A Survey of Blockchain Security Issues and Challenges. IJ
Network Security, 19(5), 653-659.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in
Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250-1258.
Bibliography
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of internet
of things. arXiv preprint arXiv:1501.02211.
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues,
challenges, and open problems in the internet of things. In 2015 IEEE World Congress on
Services (pp. 21-28). IEEE.
Jokar, P., Arianpoo, N., & Leung, V. C. (2016). A survey on security issues in smart
grids. Security and Communication Networks, 9(3), 262-273.
Lin, I. C., & Liao, T. C. (2017). A Survey of Blockchain Security Issues and Challenges. IJ
Network Security, 19(5), 653-659.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in
Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250-1258.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.