IT 0 IT 3: Discussion Forum - Hardening and Security Threats

Verified

Added on  2022/08/26

|4
|772
|15
Discussion Board Post
AI Summary
This discussion forum post addresses the concept of hardening in computing networks as a method to secure and protect networks and information from cyber threats. It explains the process of identifying vulnerabilities and implementing mitigation controls, using examples like spyware as a malicious attacker. The post highlights the risks posed by both malicious attackers and authorized users, emphasizing that malicious attackers can design effective malicious codes and obtain user credentials, while authorized users can inadvertently reduce the performance of computing devices and compromise data confidentiality. The post stresses the importance of implementing firewall-based systems, encryption, and hardening systems to protect data against unauthorized access and malicious software. The references provided support the analysis of security threats and mitigation strategies.
Document Page
IT 0
Securing the enterprise
infrastructure
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT 1
Discussion forum
Hardening
Hardening is a kind of approach which is used in computing networks for securing
and protecting networks and information from hackers. It has the capability to identify and
manage unauthorized access or vulnerabilities that occurred in the computing devices and
lead security of a system. Numerous kinds of methods involved in the hardening for
securing computing systems such as UNIX and Linux networks. Using such kinds of systems
companies are capable to determine the fraud signals transferred by the attackers and
enhance the level of security while using computer systems. It helps to implement effective
mitigation controls by which the level of security can be enhanced.
Example of a malicious attacker
Spyware is an example of a malicious attack that has the capability to obtain
information about the business communities without taking their permissions. Pathak,
Pawar, & Patil, (2015) reported that spyware is a malicious based attack which infiltrates
computing devices used by the individuals and gather sensitive data by transfer spam and
fraud signals to the main networks. It is a major cyber-attack faced by the business
communities and helps criminals to obtain personal information including address, profile,
login credentials, credit or debit card details and many more.
From recent studies, it is highlighted that around 978 million consumers in 20
regions were suffered by the spyware kind of malicious attack in 2017 and most of the
hackers transfer unauthorized signals to the computer devices and obtain login credentials
for gathering personal information (Akhil, Nair, & Arun, 2014). It is found that an
authorized consumer can be a threat to system security as it helps to reduce the
performance of computing devices and obtain log in details of computers. By gathering
such accessibility the hackers can reduce confidentiality and availability of data that
negatively impact on the sensitive data. More than 60% of the hackers use unauthorized
access for obtaining accessibility of computing devices and produce the data breach-related
problems in the business communities (Abualola, et al., 2016).
Document Page
IT 2
Malicious attackers
It is true that malicious attackers are more of a threat to computing security as they
are capable to design and implement effective malicious codes by which the hacking and
data breach activities can be performed effectively. Sheta, Zaki, El Salam, & Hadad, (2015)
reported that most of the security threats or attacks are performed by malicious attackers
as they have the potential to break the security of computing devices and obtain login
credentials of the user’s databases by transferring spam and unauthorized signals. In this
modern era, many organizations are facing security attacks where the hackers utilize
malware and malicious networks for implementing effective cyber-crimes and spyware,
ransomware and DoS all these are best examples of security attacks performed by
malicious attackers.
So, it is highlighted that malicious attackers are more of a threat to computer
security and it is significant to address malicious signals from the computing devices for
securing personal data. Business communities must implement firewall-based systems and
hardening systems for protecting data against unauthorized access and malicious software.
Moreover, it includes encryption-based systems while transfer data from one computer to
another that can help to enhance the privacy of data communication channels and address
security threats.
Document Page
IT 3
References
Abualola, H., Alhawai, H., Kadadha, M., Otrok, H., & Mourad, A. (2016). An Android-based
Trojan Spyware to Study the NotificationListener Service Vulnerability.
In ANT/SEIT, 12(6), 465-471.
Akhil, S., Nair, N. M., & Arun, R. (2014). Detection and prevention of keylogger spyware
attacks. International journal of computer engineering and technology (IJCET), 5(12),
167-172.
Pathak, N., Pawar, A., & Patil, B. (2015). A survey on keylogger: A malicious
attack. International Journal of Advanced Research in Computer Engineering and
Technology, 12(6), 12-18.
Sheta, M. A., Zaki, M., El Salam, K. A., & Hadad, E. (2015). Design and implementation of an
anti-spyware system using design patterns. International Journal of Computer
Applications, 123(2), 12-18.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]