Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The five priority threats to security are phishing, malware, misleading applicat

ID: 3889074 • Letter: T

Question

The five priority threats to security are phishing, malware, misleading applications, spoofed websites, and email attachments. Define each of these threats and indicate the computer, network, and database measures that need to Be taken to ensure the security of the network. The five priority threats to security are phishing, malware, misleading applications, spoofed websites, and email attachments. Define each of these threats and indicate the computer, network, and database measures that need to Be taken to ensure the security of the network.

Explanation / Answer

Phising:

It is an attempt to get the sensitive informations like, login info , payment info through a trust worthy electronic platform.

Example: Attackers will send you emails like a know person, once you open the email, or read the message from any social network. It wil redirect you to open a link having malware in it.

Over come phising attack:

1. Protect your computer by installing firewall, spam filter, anti-virus, anti-spyware software. It will restrict the spam at the entry level itself.

2. Never provide sensitive information over email or phone call, also never enter login information at the pop-ups to safeguard your network from phising.

3. Always provide authentication at various level to safeguard your database from phising.

Malware:

          It is a malicious software program, designed mainly to exploit the victim system.With that one can get full access to the system , using that easily the system can be crashed.

Example : Adware, trojan horse, viruses, spyware.

1. To protect the systems from malware, one have to install anti virus softwares, spyware softwares, firewall installation.

2. To safeguard the computer network from malware one have to use complex passwords for authentication and enabling various levels of security settings.

3. In order to cover a database from malware, there should be a routine security check up and regular updates on the antiwares installed in the server and client system.

Misleading applications:

                                     It is latest way followed by the attackers to exploit the victims system. The misleading application creator will develop a script that will falsely run a scan over your system and will conclude that you're system has been attacked, and the creator will make the victim install the misleading application on their system, by convincing it as the solution for the attack.

It was high level of security threat to any system or network, need to take immediate actions to overcome the situation.

1. To get the situation under control one need to do a full scan over the system to find out the threat

2. Remove all the appdata from the computer and restart the computer in safemode, to control the impact of the application.

3. Go with leading anti virus support and provide a detail discription regarding the threat to get the immediate and better solution.

Spoofed websites:

                        It is process of creating a hoax website based on a well known website that has wide reach with the people. The developer will design the website in such way it look similar to the original website.Sometime even it will have a very similar url with the original one. Based on the bugs in any browser it will automatically try to exploit the victim's system.

Example : A very recent attack named ransomware, it will lock any of the important file in the system and will the users to pay ransom to release it.

There are lot of way mentioned by the internet savy's to get rid of website spoofing.

1. Have a regular patch update for the browsers used in the system.

2. Always try to access a website through ssl/TLS to avoid the website spoofing.

3. Make sure the firewall and security tools are enabled and up to date, inorder to ensure the security agains spoof websites.

Email attachements attack:

                          It is older way in which the attacker will attach any malicious program along with the email. Once a person open the attachement, it will automatically take a host in your system.

1. Now there are lot of scan tools are made available by the email service providers itself, make sure you scan the attachment before downloading it to your computer.

2. Also make sure that you've enabled the antiviruses in your system in order to prevent your system from the attack.