CYB-362 Lab 2: Analyzing Information System Threats and Defenses
VerifiedAdded on 2022/09/09
|5
|755
|19
Report
AI Summary
This report, submitted as part of CYB-362 Lab 2, delves into the critical domain of information system threats, focusing on social engineering techniques and their impact on network security. The report meticulously examines various attack methods, including phishing, spear phishing, baiting, pretextin...

Running Head: Information System Threats, Attacks and Defenses LAB 2
Information System Threats, Attacks and Defenses LAB 2
Name of the Student
Name of the University
Author’s note
Information System Threats, Attacks and Defenses LAB 2
Name of the Student
Name of the University
Author’s note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Information System Threats, Attacks and Defenses LAB 2 1
Table of Contents
Introduction:....................................................................................................................................2
Discussion:.......................................................................................................................................2
Conclusion:......................................................................................................................................3
References:......................................................................................................................................4
Table of Contents
Introduction:....................................................................................................................................2
Discussion:.......................................................................................................................................2
Conclusion:......................................................................................................................................3
References:......................................................................................................................................4

Information System Threats, Attacks and Defenses LAB 2 2
Introduction:
Social engineering have been heavily used for analyzing the issues that are present in the
networking system. With the help of the social engineering technique the major aspect that is
considered is that the loopholes that are present in the networking system is analyzed (Hatfield
2019). This analysis includes the fact that there is a requirement of a proper medium, via which
the attack will be conducted.
Discussion:
The major attacks that can be considered for exposing the computer network system
includes the likes of phishing, sheer phishing, baiting, Pre texting and Vishing. These are the
major techniques that were being implemented in the process that have been effecting the entire
robustness of the system.
Phishing is considered to be the most common attack that have been getting conducted in
a huge manner. It is seen that the imposter creates a website as well as support portals for
processing of the internal data. The medium that have been chosen for completion of the attack
includes e mails and social media platforms (Lohani 2019). The sole way of eliminating the
chance of occurrence of phishing is to spam the filters that are present in the email accounts.
Again sheer phishing is considered to be one of the major way that can be assumed as a
subset of the phishing. It have been seen in that case, proper targeting of the users gets important.
Recalling Trojan horse scene in a tragic scene have been one of the major aspect that is to
be considered. It have been seen that the attacker leaves behind the infected USB. The major
Introduction:
Social engineering have been heavily used for analyzing the issues that are present in the
networking system. With the help of the social engineering technique the major aspect that is
considered is that the loopholes that are present in the networking system is analyzed (Hatfield
2019). This analysis includes the fact that there is a requirement of a proper medium, via which
the attack will be conducted.
Discussion:
The major attacks that can be considered for exposing the computer network system
includes the likes of phishing, sheer phishing, baiting, Pre texting and Vishing. These are the
major techniques that were being implemented in the process that have been effecting the entire
robustness of the system.
Phishing is considered to be the most common attack that have been getting conducted in
a huge manner. It is seen that the imposter creates a website as well as support portals for
processing of the internal data. The medium that have been chosen for completion of the attack
includes e mails and social media platforms (Lohani 2019). The sole way of eliminating the
chance of occurrence of phishing is to spam the filters that are present in the email accounts.
Again sheer phishing is considered to be one of the major way that can be assumed as a
subset of the phishing. It have been seen in that case, proper targeting of the users gets important.
Recalling Trojan horse scene in a tragic scene have been one of the major aspect that is to
be considered. It have been seen that the attacker leaves behind the infected USB. The major
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Information System Threats, Attacks and Defenses LAB 2 3
goal behind is that the in case any of the USB and other affected services and managed in a
proper manner hence data from the network from the user profile can be easily fetched.
Another technique that is to be considered the pretexting. In this section, the targets are
initially chosen and the attack is commenced in that manner. It have been seen that the
personalization is have been considering better target analysis (Dan & Gupta 2019). This are the
analysis includes the fact that there have been better management of the usage of fake e mails in
the working process as well. It have been seen that there are chances to get hack the network as
well.
Again in case of Vishong, there has been a usage of the phone and hence wise this
ensures that there have been recreation of the interactive voice response. This creation of
interactive voice response have been dealing with the fact that there have been proper assessment
of the data gathering from the system (Ozkaya 2018). There have been usage of the toll free
numbers and hence the data that are provided after calling in the toll free number is also
considered in this case. It have been seen that the data have been gathered.
Conclusion:
Thus, it can be concluded that these are the major techniques that can be used in the
process for performing proper analysis of the assessment the networking system. These
techniques of social engineering can be used for checking the robustness of the networking
system as well.
goal behind is that the in case any of the USB and other affected services and managed in a
proper manner hence data from the network from the user profile can be easily fetched.
Another technique that is to be considered the pretexting. In this section, the targets are
initially chosen and the attack is commenced in that manner. It have been seen that the
personalization is have been considering better target analysis (Dan & Gupta 2019). This are the
analysis includes the fact that there have been better management of the usage of fake e mails in
the working process as well. It have been seen that there are chances to get hack the network as
well.
Again in case of Vishong, there has been a usage of the phone and hence wise this
ensures that there have been recreation of the interactive voice response. This creation of
interactive voice response have been dealing with the fact that there have been proper assessment
of the data gathering from the system (Ozkaya 2018). There have been usage of the toll free
numbers and hence the data that are provided after calling in the toll free number is also
considered in this case. It have been seen that the data have been gathered.
Conclusion:
Thus, it can be concluded that these are the major techniques that can be used in the
process for performing proper analysis of the assessment the networking system. These
techniques of social engineering can be used for checking the robustness of the networking
system as well.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Information System Threats, Attacks and Defenses LAB 2 4
References:
Dan, A., & Gupta, S. (2019). Social engineering attack detection and data protection model
(SEADDPM). In Proceedings of International Ethical Hacking Conference 2018 (pp. 15-
24). Springer, Singapore.
Hatfield, J. M. (2019). Virtuous human hacking: The ethics of social engineering in penetration-
testing. computers & security, 83, 354-366.
Lohani, S. (2019). Social Engineering: Hacking into Humans. International Journal of Advanced
Studies of Scientific Research, 4(1).
Ozkaya, E. (2018). Learn Social Engineering: Learn the art of human hacking with an
internationally renowned expert. Packt Publishing Ltd.
References:
Dan, A., & Gupta, S. (2019). Social engineering attack detection and data protection model
(SEADDPM). In Proceedings of International Ethical Hacking Conference 2018 (pp. 15-
24). Springer, Singapore.
Hatfield, J. M. (2019). Virtuous human hacking: The ethics of social engineering in penetration-
testing. computers & security, 83, 354-366.
Lohani, S. (2019). Social Engineering: Hacking into Humans. International Journal of Advanced
Studies of Scientific Research, 4(1).
Ozkaya, E. (2018). Learn Social Engineering: Learn the art of human hacking with an
internationally renowned expert. Packt Publishing Ltd.
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.