Cyber Security Attacks and Techniques - Threat Analysis and Trends
VerifiedAdded on 2023/06/15
|14
|1105
|277
Report
AI Summary
This report provides a comprehensive analysis of cyber security attacks and techniques, focusing on threat actors, current trends, and vulnerabilities. It begins by defining different threat actors, such as state-sponsored actors, organized cybercrime groups, and hacktivists, outlining their motivati...
Read More
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Cyber security attacks and
techniques
techniques
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Threats
Describe and provide a minimum of three examples for each of the following:
Threat actors
A state sponsored actor is one of the threat actors whose target is any and every
computer which gets motivated from the cyber warfare for political and economic
agendas. Its best defense is the patch for vulnerability management. Organized
cybercrime is the second thread actor whose target is the enterprises and motivation
are the financial gain and profits along with the best defense are the good cyber
hygiene. Hacktivist is the third threat actor whose target is the government entities
and corporations and motivations are the political and environmental causes which
have the best defense of understanding the TTP.
Describe and provide a minimum of three examples for each of the following:
Threat actors
A state sponsored actor is one of the threat actors whose target is any and every
computer which gets motivated from the cyber warfare for political and economic
agendas. Its best defense is the patch for vulnerability management. Organized
cybercrime is the second thread actor whose target is the enterprises and motivation
are the financial gain and profits along with the best defense are the good cyber
hygiene. Hacktivist is the third threat actor whose target is the government entities
and corporations and motivations are the political and environmental causes which
have the best defense of understanding the TTP.

Current trends
Identify and describe trends in cyber attacks, including the impact
of cyber threat vectors
Current trends in cyber attack which the hacker chooses to fulfill their
negative intentions. For example threat vectors which includes
malware and phishing along with the man in the middle attacks and
denial of service attack which is followed by the SQL injections and
zero day exploit and also the password attack. Moreover and other
trends of Cyber attack are the cross site scripting and dive by
download and many more (Shaukat, Luo, Varadharajan and Li, 2020).
Identify and describe trends in cyber attacks, including the impact
of cyber threat vectors
Current trends in cyber attack which the hacker chooses to fulfill their
negative intentions. For example threat vectors which includes
malware and phishing along with the man in the middle attacks and
denial of service attack which is followed by the SQL injections and
zero day exploit and also the password attack. Moreover and other
trends of Cyber attack are the cross site scripting and dive by
download and many more (Shaukat, Luo, Varadharajan and Li, 2020).

Untargeted and targeted
attacks
List and provide at least one example for each of the categories of
vulnerabilities used in:
Untargeted cyber attacks
Un targeted attacks are the attacks in which the attackers indiscriminately
focus on the devices and services. They don't know about the victims and
the vulnerabilities will be the large number of machines and services
owned or provided by the organizations. malware is one of the examples
which includes the worms and computer viruses along with the Trojan
horses and spyware (Torres, Comesaña and Garcia-Nieto, 2019).
attacks
List and provide at least one example for each of the categories of
vulnerabilities used in:
Untargeted cyber attacks
Un targeted attacks are the attacks in which the attackers indiscriminately
focus on the devices and services. They don't know about the victims and
the vulnerabilities will be the large number of machines and services
owned or provided by the organizations. malware is one of the examples
which includes the worms and computer viruses along with the Trojan
horses and spyware (Torres, Comesaña and Garcia-Nieto, 2019).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Malware attacks
Demonstrate and describe how malware exploits un-patched
systems
Malware is the software which is specially designed to damage and
destroy the computer systems in the form of viruses and Trojan
viruses and ransomware. They exploit the unpatched systems by
creating the more vulnerable software so that the other creatures
such as worms and spyware can easily attack the systems with
the bad intention (Le, Kumar, Mishra and Khari, 2019).
Demonstrate and describe how malware exploits un-patched
systems
Malware is the software which is specially designed to damage and
destroy the computer systems in the form of viruses and Trojan
viruses and ransomware. They exploit the unpatched systems by
creating the more vulnerable software so that the other creatures
such as worms and spyware can easily attack the systems with
the bad intention (Le, Kumar, Mishra and Khari, 2019).

How the antivirus solution scans the
system
system

The detection of the EICAR ‘virus’ by
the antivirus solution
the antivirus solution
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Description of the file

How the antivirus solution deals with the detected
threat (quarantine/recommendations/etc.)
threat (quarantine/recommendations/etc.)

Typical infection methods for
ransom ware style virus or malware
ransom ware style virus or malware
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Attacks against network
perimeter and end users
Describe techniques used by attackers to infiltrate and escalate privileges.
Include techniques that attack the perimeter as well as end users
There are various techniques which are used by the attackers to infiltrate and
escalate the privileges. For example, if a password is weak then it can easily
access and retrieve the file which is confidential for the organization or for the
individual. Moreover, attackers process the weak permissions and sensitive
information stored in the shared folders. They also preload the dll files. These
are the techniques which are the parameters used by the attackers (Alqahtani,
Sarker, Kalim and Hossain, 2020).
perimeter and end users
Describe techniques used by attackers to infiltrate and escalate privileges.
Include techniques that attack the perimeter as well as end users
There are various techniques which are used by the attackers to infiltrate and
escalate the privileges. For example, if a password is weak then it can easily
access and retrieve the file which is confidential for the organization or for the
individual. Moreover, attackers process the weak permissions and sensitive
information stored in the shared folders. They also preload the dll files. These
are the techniques which are the parameters used by the attackers (Alqahtani,
Sarker, Kalim and Hossain, 2020).

Wireless vulnerabilities
Describe one example of how wireless WPA2 can be hacked
Wireless wpa2 can be hacked by attacking the Wi-Fi networks
with the help of injection malicious data into the unencrypted
http connections. For example attack abuses to inject the
ransomware into websites on which the victim is visiting.
This can also be done by intercepting the data being
transmitted from one access point to another (Narayanan,
Ganesan, Joshi, Oates, Joshi and Finin, 2018).
Describe one example of how wireless WPA2 can be hacked
Wireless wpa2 can be hacked by attacking the Wi-Fi networks
with the help of injection malicious data into the unencrypted
http connections. For example attack abuses to inject the
ransomware into websites on which the victim is visiting.
This can also be done by intercepting the data being
transmitted from one access point to another (Narayanan,
Ganesan, Joshi, Oates, Joshi and Finin, 2018).

Internet of things security
issues
What is IoT? Describe at least three different examples of IoT devices
The internet of things refers to the different physical objects which are embedded with
the processing ability and software along with the sensors and other technologies
which connect and exchange the data with other devices and systems with the help of
networks and the internet. There are various examples of internet of things devices
such as connected appliances and smart home security systems along with the
autonomic farming equipment and variable health monitors. Moreover, smart factory
equipment and wireless inventory trackers along with the ultra high speed wireless
internet and biometric cyber security scanners are also examples of the internet of
things (Zeadally, Adi, Baig and Khan, 2020).
issues
What is IoT? Describe at least three different examples of IoT devices
The internet of things refers to the different physical objects which are embedded with
the processing ability and software along with the sensors and other technologies
which connect and exchange the data with other devices and systems with the help of
networks and the internet. There are various examples of internet of things devices
such as connected appliances and smart home security systems along with the
autonomic farming equipment and variable health monitors. Moreover, smart factory
equipment and wireless inventory trackers along with the ultra high speed wireless
internet and biometric cyber security scanners are also examples of the internet of
things (Zeadally, Adi, Baig and Khan, 2020).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

REFERENCES
Alqahtani, H., Sarker, I.H., Kalim, A. and Hossain, S., 2020, March. Cyber intrusion detection using machine learning
classification techniques. In International Conference on Computing Science, Communication and Security (pp. 121-131).
Springer, Singapore.
Le, D.N., Kumar, R., Mishra, B.K. and Khari, M. eds., 2019. Cyber Security in Parallel and Distributed Computing: Concepts,
Techniques, Applications and Case Studies. John Wiley & Sons.
Narayanan, S.N., Ganesan, A., Joshi, K., Oates, T., Joshi, A. and Finin, T., 2018, October. Early detection of cybersecurity threats
using collaborative cognition. In 2018 IEEE 4th international conference on collaboration and internet computing (CIC) (pp.
354-363). IEEE.
Salloum, S.A., Alshurideh, M., Elnagar, A. and Shaalan, K., 2020, March. Machine Learning and Deep Learning Techniques for
Cybersecurity: A Review. In AICV (pp. 50-57).
Shaukat, K., Luo, S., Varadharajan, V. and Li, J., 2020. Performance comparison and current challenges of using machine
learning techniques in cybersecurity. Energies, 13(10), p.2509.
Torres, J.M., Comesaña, C.I. and Garcia-Nieto, P.J., 2019. Machine learning techniques applied to cybersecurity. International
Journal of Machine Learning and Cybernetics, 10(10), pp.2823-2836.
Zeadally, S., Adi, E., Baig, Z. and Khan, I.A., 2020. Harnessing artificial intelligence capabilities to improve cybersecurity. Ieee
Access, 8, pp.23817-23837.
Alqahtani, H., Sarker, I.H., Kalim, A. and Hossain, S., 2020, March. Cyber intrusion detection using machine learning
classification techniques. In International Conference on Computing Science, Communication and Security (pp. 121-131).
Springer, Singapore.
Le, D.N., Kumar, R., Mishra, B.K. and Khari, M. eds., 2019. Cyber Security in Parallel and Distributed Computing: Concepts,
Techniques, Applications and Case Studies. John Wiley & Sons.
Narayanan, S.N., Ganesan, A., Joshi, K., Oates, T., Joshi, A. and Finin, T., 2018, October. Early detection of cybersecurity threats
using collaborative cognition. In 2018 IEEE 4th international conference on collaboration and internet computing (CIC) (pp.
354-363). IEEE.
Salloum, S.A., Alshurideh, M., Elnagar, A. and Shaalan, K., 2020, March. Machine Learning and Deep Learning Techniques for
Cybersecurity: A Review. In AICV (pp. 50-57).
Shaukat, K., Luo, S., Varadharajan, V. and Li, J., 2020. Performance comparison and current challenges of using machine
learning techniques in cybersecurity. Energies, 13(10), p.2509.
Torres, J.M., Comesaña, C.I. and Garcia-Nieto, P.J., 2019. Machine learning techniques applied to cybersecurity. International
Journal of Machine Learning and Cybernetics, 10(10), pp.2823-2836.
Zeadally, S., Adi, E., Baig, Z. and Khan, I.A., 2020. Harnessing artificial intelligence capabilities to improve cybersecurity. Ieee
Access, 8, pp.23817-23837.
1 out of 14

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.