Cyber Security Attacks and Techniques - Threat Analysis and Trends

Verified

Added on  2023/06/15

|14
|1105
|277
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber security attacks and
techniques
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Threats
Describe and provide a minimum of three examples for each of the following:
Threat actors
A state sponsored actor is one of the threat actors whose target is any and every
computer which gets motivated from the cyber warfare for political and economic
agendas. Its best defense is the patch for vulnerability management. Organized
cybercrime is the second thread actor whose target is the enterprises and motivation
are the financial gain and profits along with the best defense are the good cyber
hygiene. Hacktivist is the third threat actor whose target is the government entities
and corporations and motivations are the political and environmental causes which
have the best defense of understanding the TTP.
Document Page
Current trends
Identify and describe trends in cyber attacks, including the impact
of cyber threat vectors
Current trends in cyber attack which the hacker chooses to fulfill their
negative intentions. For example threat vectors which includes
malware and phishing along with the man in the middle attacks and
denial of service attack which is followed by the SQL injections and
zero day exploit and also the password attack. Moreover and other
trends of Cyber attack are the cross site scripting and dive by
download and many more (Shaukat, Luo, Varadharajan and Li, 2020).
Document Page
Untargeted and targeted
attacks
List and provide at least one example for each of the categories of
vulnerabilities used in:
Untargeted cyber attacks
Un targeted attacks are the attacks in which the attackers indiscriminately
focus on the devices and services. They don't know about the victims and
the vulnerabilities will be the large number of machines and services
owned or provided by the organizations. malware is one of the examples
which includes the worms and computer viruses along with the Trojan
horses and spyware (Torres, Comesaña and Garcia-Nieto, 2019).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Malware attacks
Demonstrate and describe how malware exploits un-patched
systems
Malware is the software which is specially designed to damage and
destroy the computer systems in the form of viruses and Trojan
viruses and ransomware. They exploit the unpatched systems by
creating the more vulnerable software so that the other creatures
such as worms and spyware can easily attack the systems with
the bad intention (Le, Kumar, Mishra and Khari, 2019).
Document Page
How the antivirus solution scans the
system
Document Page
The detection of the EICAR ‘virus’ by
the antivirus solution
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Description of the file
Document Page
How the antivirus solution deals with the detected
threat (quarantine/recommendations/etc.)
Document Page
Typical infection methods for
ransom ware style virus or malware
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Attacks against network
perimeter and end users
Describe techniques used by attackers to infiltrate and escalate privileges.
Include techniques that attack the perimeter as well as end users
There are various techniques which are used by the attackers to infiltrate and
escalate the privileges. For example, if a password is weak then it can easily
access and retrieve the file which is confidential for the organization or for the
individual. Moreover, attackers process the weak permissions and sensitive
information stored in the shared folders. They also preload the dll files. These
are the techniques which are the parameters used by the attackers (Alqahtani,
Sarker, Kalim and Hossain, 2020).
Document Page
Wireless vulnerabilities
Describe one example of how wireless WPA2 can be hacked
Wireless wpa2 can be hacked by attacking the Wi-Fi networks
with the help of injection malicious data into the unencrypted
http connections. For example attack abuses to inject the
ransomware into websites on which the victim is visiting.
This can also be done by intercepting the data being
transmitted from one access point to another (Narayanan,
Ganesan, Joshi, Oates, Joshi and Finin, 2018).
Document Page
Internet of things security
issues
What is IoT? Describe at least three different examples of IoT devices
The internet of things refers to the different physical objects which are embedded with
the processing ability and software along with the sensors and other technologies
which connect and exchange the data with other devices and systems with the help of
networks and the internet. There are various examples of internet of things devices
such as connected appliances and smart home security systems along with the
autonomic farming equipment and variable health monitors. Moreover, smart factory
equipment and wireless inventory trackers along with the ultra high speed wireless
internet and biometric cyber security scanners are also examples of the internet of
things (Zeadally, Adi, Baig and Khan, 2020).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Alqahtani, H., Sarker, I.H., Kalim, A. and Hossain, S., 2020, March. Cyber intrusion detection using machine learning
classification techniques. In International Conference on Computing Science, Communication and Security (pp. 121-131).
Springer, Singapore.
Le, D.N., Kumar, R., Mishra, B.K. and Khari, M. eds., 2019. Cyber Security in Parallel and Distributed Computing: Concepts,
Techniques, Applications and Case Studies. John Wiley & Sons.
Narayanan, S.N., Ganesan, A., Joshi, K., Oates, T., Joshi, A. and Finin, T., 2018, October. Early detection of cybersecurity threats
using collaborative cognition. In 2018 IEEE 4th international conference on collaboration and internet computing (CIC) (pp.
354-363). IEEE.
Salloum, S.A., Alshurideh, M., Elnagar, A. and Shaalan, K., 2020, March. Machine Learning and Deep Learning Techniques for
Cybersecurity: A Review. In AICV (pp. 50-57).
Shaukat, K., Luo, S., Varadharajan, V. and Li, J., 2020. Performance comparison and current challenges of using machine
learning techniques in cybersecurity. Energies, 13(10), p.2509.
Torres, J.M., Comesaña, C.I. and Garcia-Nieto, P.J., 2019. Machine learning techniques applied to cybersecurity. International
Journal of Machine Learning and Cybernetics, 10(10), pp.2823-2836.
Zeadally, S., Adi, E., Baig, Z. and Khan, I.A., 2020. Harnessing artificial intelligence capabilities to improve cybersecurity. Ieee
Access, 8, pp.23817-23837.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]