CS 321 HW 01 Latest Information Security Threats and Attacks Submit a Research A
ID: 3748781 • Letter: C
Question
CS 321 HW 01 Latest Information Security Threats and Attacks Submit a Research Assignment on "Latest Information Security Threats and Attacks". The topic must talk about what are Threats and Attacks, giving at least TWO detailed examples for each and discussing the impact, and with a discussion clearly showing why the example is a Threat not an attack or vice-versa. Do not forget the Bibliography. Follow the format given under the 'Guidelines for Assignment Submission" DUE: September 17, 2018 by 9:00 am via email. Subject Line: CS321 HW01 Latest information Security Threats and AttacksExplanation / Answer
Answer)
Latest Information Security Threats and Attacks-
Information security is a necessary feature of cybersecurity. Everything on the internet is unsecured and thus securing the data and private information on the Internet is a huge task. Cybersecurity poses threats when attacks happen to reveal the secure and private information of individuals, companies, and governments. Threats on the Internet are of many types and mainly considering the 2 type of threats target 2 things mainly -- money and data. So securing data is as important as securing money as data on the Internet is as valuable as money. The threats are controlled and attacked by the attackers who pose a threat to the people and do damage and data leakage from websites containing the users' personal information and other sensitive information. Thus threats are on the Internet and in the cyber world. Cybersecurity is very important in today's world where we need to control the security of every party and protect one from attackers/hackers who steal personal information and other parties who collect personal information of the user without the user's consent. There are several risks in the cyber world on sharing personal content and using the services of the websites such as social networks and using the cloud services. Cybersecurity risks arise from the usage of the internet and on sharing information on the Internet as it is an unsecured medium. Consequences of not taking cyber security seriously are many such as losing money and data, data leakage, hacked, infected with virus and worms. Information leakage is the biggest threat that can ever be and is the main consequence of the world in cybersecurity.
There are many different types of attacks performed by attackers, some are:
a) Malware attacks are used by attackers which use software which is harmful to the user PC and use viruses and ransomware. Malware takes full control os the user system and damages many data on it, monitors the actions of the users and hacker can steal data from the system using it.
b) Phishing attacks are the type of attack where the attacker will pose as a genuine party and compel you to enter sensitive information in an email or a website faking the original website and thus attacking the user stealing the sensitive data from him.
c) SQL Injection attack is performed by the attackers on the database using malicious SQL code to get sensitive information from the database and steal data.
d) Denial of Service DOS attack are the attacks by the attackers where the attacker floods a website with huge traffic which the website is not able to handle and ultimately brings the website service down.
e) Man-in-the-Middle Attacks is the posing of a person which appears to be the trustworthy person to each person who is communicating by no, it is the attacker who is stealing the information from both sides and attacking for the release of the sensitive information.
The above are the attacks which are made directly to the users to compromise the data contained in the computers and networks.
The top 2 threats of today's cybersecurity are:
a) Getting the information and confidential data compromised as a result of the data leaks.
b) Financial losses and data compromisation because of data leakage and man-in-the-middle attacks and malware attacks.
The above are the threats which are mostly the motive, behind the attacks, as an attack will have a motive to damage, or steal, any information, data, or financial profit, through malicious means. Thus the threats are the reasons for the attacks.