Premium Essay

Is4560 Unit 1

In:

Submitted By parisey1
Words 500
Pages 2
Hacking and Countermeasures IS4560 Unit 1 Assignment 1

July 26 2016

Hacking and Countermeasure

Here are some of the top threats described in the whitepaper and why the threats are important issues and how these threats have changed or are changing. The main issues that I found were Web browser vulnerabilities and SQL-injection attacks. These types of threats are found often and hackers exploit them all the time. One of the most known browsers to get exploited is internet explorer. “In the case of the Hydraq attack, a previously unknown vulnerability in Microsoft® Internet Explorer® and a patched vulnerability in Adobe® Reader® and Adobe Flash® Player are exploited to install the Trojan.10 Once the Trojan is installed, it lets attackers perform various actions on the compromised system including giving them full remote access. Microsoft has had to release patches for Internet explorer. Attacks can originate from malicious websites as well as legitimate websites that have been compromised. So in the end it doesn't really matter which web browser you are using the end result will be the same if their vulnerabilities are not updated. According to statistics from 2014, there was an increase in the market share of Chrome, Firefox, and Safari at the expense of Internet Explorer over the course of the year. The second most widely exploited attack was the downloading of a suspicious PDF, this was really affecting those who were after information regarding the H1n1 virus. By observing the malicious activity by region helps different companies prepare for what type of threats are most likely to be used against their systems. These are very important issues that companies and organizations face as long as there are hackers out there. Web browser companies take extreme measures to ensure that their browsers

Similar Documents

Free Essay

Is4560 Unit 1

...IS4560 Unit 1 Assignment 1 Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks. Data breaches that could lead to identity theft, by sector - the danger of data breaches is of particular importance for organizations that store and manage large amounts of personal information. not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations. Bot-infected computers - Bots allow for a wide range of functionality and most can be updated to assume increased functionality by downloading new code and features. Attackers can use bots to perform a variety of tasks, such as setting up denial-of-service (DoS) attacks against an organization’s website, distributing spam and phishing attacks, distributing spyware and adware, propagating malicious code, and harvesting confidential information that may be used...

Words: 301 - Pages: 2

Free Essay

Is4560 Unit 2 Assignment 1

...Shaun Howard IS4560 – Hacking and Countermeasures Unit 2 Assignment 1 September 30, 2014 1. _________ type of certificate is used to provide security on Web sites. a. SSL 2. __________ is the most common public key encryption systems and, in most cases, this relies on manual trust and key distribution. b. PKI 3. __________ provides authentication or proves integrity of a digital message. c. MAC 4. ___________ encryption scheme was broken and was replaced with a third round version of itself. d. 3DES 5. _________ is the first algorithm suited to both signing and encryption, and it is now widely used in e-commerce and other public key systems. e. RSA 6. The entity that issues certificates is a __________. f. Certificate Authority 7. The document to check to verify whether a certificate has been revoked is __________. g. CRL 8. Each bit of length _______the number of keys. h. Increases 9. Currently, _______ bit certificates are commonly used for web communications. i. 128 10. Triple DES provides ________ bits of security, despite using a 168 bit key. j. 112 11. Thawte, Verisign, and Comodo are all examples of _____________. k. SSL Certificate Providers 12. Hiding data in images is an example of ____________. l. Steganography 13. Data Encryption Standard (DES), ROT13, and Enigma are all examples of ______________. m. Cryptography ...

Words: 273 - Pages: 2

Premium Essay

Qwert

...IS4560 Unit 3 Assignment 1 Information Gathering Plan The explosive growth and popularity of the world-wide web have resulted in thousands of structured query able information sources on the Internet, and the promise of unprecedented information-gathering capabilities to lay users. Unfortunately, the promise has not yet been transformed into reality. While there are sources relevant to virtually any user-queries, the morass of sources presents a formidable hurdle to effectively accessing the information. One way of alleviating this problem is to develop a information gatherer which take the user’s query, and develop and execute an effective information gathering plan that accesses the relevant sources to answer the user’s query efficiently. Most organizations are familiar with Penetration Testing (often abbreviated to, “pen testing”) and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files. However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet...

Words: 284 - Pages: 2

Premium Essay

Homework 1

...IS4560 Hacker tools, techniques and incident handeling Unit 1 Homework 1 Attacks are defined as any malicious activity carried out over a network that has been detected by an intrusion detection system, intrusion prevention system, or firewall. Based on the geographical map the whitepaper lays out for us, the United States receives chart topping threats in malicious code, phishing hosts, bots, and attack origin. Web based threats are increasing by the day with the endless amount of client-side vulnerabilities, attackers can focus on websites to mount additional, client side attacks. The most common web based attack in 2009 was related to malicious PDF activity, which actually accounted for almost 50% of web-based attacks. The year before that number was only at 11%. This attack got so popular because exchanging PDF files was a common day to day activity. So it wasn’t rare when you saw one in your inbox and didn’t think twice before opening it. 34% of all web based attacks happen in the United States, China is second with 7%. Some of those extremely high U.S. numbers are actually on the decline from the previous year’s report. Most of the decrease is because of increases in other countries and the Federal Trade Commission shut down a ISP that was known to distribute malicious code, among other content. One of the botnets linked to the ISP was Pandex (aka Cutwall). This botnet was responsible for as much as 35% of spam observed globally. The most difficult...

Words: 456 - Pages: 2

Premium Essay

Information Gathering Plan

...IS4560 Unit 3 Assignment 1 Information Gathering Plan The explosive growth and popularity of the world-wide web have resulted in thousands of structured query able information sources on the Internet, and the promise of unprecedented information-gathering capabilities to lay users. Unfortunately, the promise has not yet been transformed into reality. While there are sources relevant to virtually any user-queries, the morass of sources presents a formidable hurdle to effectively accessing the information. One way of alleviating this problem is to develop a information gatherer which take the user’s query, and develop and execute an effective information gathering plan that accesses the relevant sources to answer the user’s query efficiently. Most organizations are familiar with Penetration Testing (often abbreviated to, “pen testing”) and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files. However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet,...

Words: 596 - Pages: 3

Premium Essay

Test

...Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640...

Words: 2305 - Pages: 10