COBA MIS 201 Project Report: Unauthorized Access Phases and Methods

Verified

Added on  2023/04/20

|5
|823
|481
Report
AI Summary
This report, prepared for the MIS 201 Introduction to Information Systems course, investigates the methods hackers employ to gain unauthorized access to computer systems. It focuses on three key phases: the scanning phase, where attackers gather information about a target system; the break-in phase, where vulnerabilities are exploited to gain initial access; and the after break-in phase, which involves maintaining access and potentially installing backdoors or payloads. The report provides an overview of the tools and techniques used in each phase, offering insights into the steps involved in network intrusion and emphasizing the importance of understanding these phases for cybersecurity purposes. The report includes references to relevant sources, supporting the analysis of these critical stages in the hacking process.
Document Page
Running head: INTRODUCTION TO INFORMATION SYSTEM
Introduction to Information System
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INTRODUCTION TO INFORMATION SYSTEM
Table of Contents
Introduction......................................................................................................................................2
Discussion........................................................................................................................................2
Scanning Phase............................................................................................................................2
The Break-in................................................................................................................................2
After Break-in..............................................................................................................................3
Conclusion.......................................................................................................................................3
References........................................................................................................................................4
Document Page
2INTRODUCTION TO INFORMATION SYSTEM
Introduction
Network attack can be stated as a kind of intrusion attack which helps in analyzing the
current environment and can collect required information. It is mainly done for exploiting the
current port or vulnerabilities in the network (Seigfried-Spellar, Villacís-Vukadinović and
Lynam, 2017). It is mainly inclusive of any kind of unauthorized access to the given resources.
Attack can be performed that is either from outside the organization by unauthorized entity that
is outside attack and within the organization that is inside attack.
In the coming pages of the report, an idea has been provided with respect to three main
phases that is scanning phase, break-in phase and lastly after break-in phase.
Discussion
Scanning Phase
Reconnaissance is a method of collecting required data and information. In this stage, the
hacker can get the required information with respect to the target system. It is all about detecting
services, operating system, and packet hops to get access to the system (Dinev et al. 2016). At
present, there is large number of tools available for use like Nmap, Google Dorks, and many
others. In the scanning stage, hackers are very active on the target machine for any kind of
vulnerabilities that can be exploited. There are large number tools available like Nmap, Nexus
and many others that can be used by hackers.
The Break-in
At present, there are many kinds of vulnerability in the computer system. Any kind of
authorized people can make misuse of stored data by the help of their authority. A single user
can impersonate with another one (Simmons 2016). In the break-in phase, proper set up of the
condition for others can be achieved like installation of virus. Physical attacks on the equipments
can comprise it. An intruder can gain access from the system which is not completely secured. In
the break-in phase, vulnerability is encountered in the break-in phase by making use of various
tools and methods. In this, the hacker aims to enter into the system without raising any kind of
alarms. The tool used in break-in phase is Metasploit.
After Break-in
After break-in phase, maintaining access comes into action which is a part of the integral
phase. In this particular phase, hackers need to install different backdoors and payloads into the
system (Chigozie-Okwum, Michael and Ugboaja, 2017). Payload is a well-known term which is
done on the system by which user can gain unauthorized access to the system. Backdoors will
help the hackers to gain easy access into the target system in the upcoming days. Clearing of task
is known to be an unethical activity. It is all about delegation of activities which will take place
in the whole process of ethical hacking. It is all about demonstration of Black Hat hacker for
their activities.
Document Page
3INTRODUCTION TO INFORMATION SYSTEM
Conclusion
From the above pages, the point can be noted that this report short research on how the
attackers can gain unauthorized access to the system. Three major phases in human break-in are
scanning phase, break-in phase and after the break-in phase has been discussed above.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4INTRODUCTION TO INFORMATION SYSTEM
References
Chigozie-Okwum, C.C., Michael, D.O. and Ugboaja, S.G., 2017. Computer forensics
investigation; implications for improved cyber security in Nigeria. AFRREV STECH: An
International Journal of Science and Technology, 6(1), pp.59-73.
https://www.ajol.info/index.php/stech/article/viewFile/154713/144296
Dinev, T., Albano, V., Xu, H., D’Atri, A. and Hart, P., 2016. Individuals’ attitudes towards
electronic health records: A privacy calculus perspective. In Advances in healthcare informatics
and analytics (pp. 19-50). Springer, Cham.
http://www.mazums.ac.ir/dorsapax/userfiles/file/Advances-Healthcare-
InformaticsPublishing.pdf#page=30
Seigfried-Spellar, K.C., Villacís-Vukadinović, N. and Lynam, D.R., 2017. Computer criminal
behavior is related to psychopathy and other antisocial behavior. Journal of Criminal Justice, 51,
pp.67-73.
https://www.researchgate.net/profile/Kathryn_Seigfried-Spellar/publication/
317828066_Computer_criminal_behavior_is_related_to_psychopathy_and_other_antisocial_beh
avior/links/59cbfd65a6fdcc451d5ce970/Computer-criminal-behavior-is-related-to-psychopathy-
and-other-antisocial-behavior.pdf
Simmons, R., 2016. The Failure of the Computer Fraud and Abuse Act: Time to Take an
Administrative Approach to Regulating Computer Crime. Geo. Wash. L. Rev., 84, p.1703.
http://www.gwlr.org/wp-content/uploads/2016/11/84-Geo.-Wash.-L.-Rev.-1703.pdf
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]