Free Essay

Security Week 4 Case Study

In:

Submitted By dj2tall
Words 796
Pages 4
Security Threats And Attacks
Week 4 Case Study
Dustin Soria
Security Threats And Attacks
Week 4 Case Study
Dustin Soria
2014
2014

Recent statistics show that a large percentage of people have the idea that computer security is an issue that only affects organizations. Many people believe that, at a personal level, there is little that one can have to do with their information especially because they don’t see if someone will need their information. In contrast, there is a lot of useful information that a third party may obtain from a personal computer that the user may not even realize. For instance, a user may have sensitive information that would lead to his or her private life, secrets, or even important financial information. Such information can be used by attackers to monitor their internet activities, whether they are logged into their own personal computer on a local network, or even the internet. The victim’s sensitive information can be sold over the internet, or even to third parties such as advertisers and criminals among others. As such, it is important that serious security measures are taken to protect one’s personal computer from such security issues. There are numerous security threats that can be on a personal computer. One of the most common threats is a Virus. A Virus is a piece of software that can replicate itself and infect a computer without the permission or knowledge of the user. A Virus can only spread when it is transmitted by a user over a network or the Internet, and removable media such as flash drives and CD’s. (The 11 most common computer security threats) Viruses themselves are usually undetectable and attach themselves to a program or an email. With damage ranging anywhere from minimal to destructive. The best way to protect yourself here is to have an up to date antivirus installed on your computer and scan your computer thoroughly at least once a week. A Trojan horse is another Virus that does something undocumented which the programmer intended, but the user would not normally accept if they knew about the Trojan horse itself. A Trojan horse can spread to other programs, turning them into Trojans as well. (What are viruses, worms, and Trojan horses?, 2014) Spyware and Ad-ware are the next ventures. Spyware is software that is installed secretly onto a computer without the user’s knowledge. It will monitor the user’s activity or interfere with the user’s control over a personal computer. (The 11 most common computer security threats) Just like with Viruses, there is anti-Spyware programs available that can combat spyware. Ad-wares are usually attached to a program that is a freeware or shareware. Even though the program itself is free, the manufacturer of the program still makes money from selling the information the ad-ware gathers from your computer. The easiest way to prevent ad-wares from being on your computer is to not download and install free software or programs that you do not trust. If you have to have the program installed, make sure you use a firewall to help monitor the incoming and outgoing traffic. Now how do hackers get into your system? Hackers can use something called a “Key Logger”, which is a device or program that records all the real time activity of a computer user including the keyboards keystrokes they make. In turn, obtaining access to personal information and accounts from the logins and passwords obtained. Hackers can also obtain access through source routing. They may be able to break through other, less secure networks to then jump to yours. (Security Attacks) To close out types of attacks, let’s discuss Spoofing. Any internet connected device necessarily sends IP diagrams into the network. Such internet data packets carry the senders IP address as well as application layer data. If the attacker obtains control over the software running on the network device, they can easily modify the devices protocols to place an arbitrary IP address into the data packets source address field. This process is called Spoofing. There are definitely more techniques that a hacker could use to gain access to a system, but the list would go on and on. Taking what you have learned here, will still help you with spotting potential security threats and preventing attacks from hackers. Make sure to stay up to date as technology changes.

Reference Page
References
Security Attacks. (n.d.). Retrieved from comptechdoc: http://www.comptechdoc.org/independent/security/recommendations/secattacks.html
The 11 most common computer security threats. (n.d.). Retrieved from symantec-Norton.com: http://www.symantec-norton.com/11-most-common-computer-security-threats_k13.aspx
What are viruses, worms, and Trojan horses? (2014). Retrieved from University Information Technology Services: https://kb.iu.edu/data/aehm.html

Similar Documents

Premium Essay

Ntc 360 Complete Class

...com/product/ntc-360-complete-class/ Contact us at: SUPPORT@ACTIVITYMODE.COM NTC 360 COMPETE CLASS 1. NTC-360 ADVANTAGE OF DIFFERENT SECURITY APPROACHES 2. NTC-360 ASSIGNMENT NETWORK ARCHITECTURE 3. NTC-360 ASSIGNMENT NETWORK PROTOCOLS 4. NTC-360 CURRENT TELEPHONE SYSTEMS OF HUFFMAN TRUCKING 5. NTC-360 HUFFMAN TRUCKING COMPANY SECURITY RECOMMENDATIONS 6. NTC-360 NETWORK OUTLINE 7. NTC-360 NETWORKING CHANGES 8. NTC-360 RIORDAN MANUFACTURING 9. NTC-360 SECURITY DISADVANTAGES 10. NTC-360 Team Assignment Riordan Manufacturing - Rough Draft 11. NTC-360 Team B Service Request SR-rm-017 paper 12. NTC-360 WEEK 1 DQ 1 13. NTC-360 WEEK 1 DQ 2 14. NTC-360 Week 2 Assignment Telecommunications 15. NTC-360 WEEK 2 DQ 1 16. NTC-360 WEEK 2 DQ 2 17. NTC-360 Week 2 Learning Team Assignment Network Topologies 18. NTC-360 Week 2 Team Paper - Network Protocols The Case of Huffman Trucking 19. NTC-360 WEEK 3 DQ 1 20. NTC-360 WEEK 3 DQ 2 21. NTC-360 week 3 individual part 1 22. NTC-360 week 3 individual part 2 23. NTC-360 Week 3 Team Assignment - Network Topologies 24. NTC-360 WEEK 4 DQ 1 25. NTC-360 WEEK 4 DQ 2 26. NTC-360 WEEK 5 DQ 1 27. NTC-360 WEEK 5 DQ 2 28. NTC-360 Week 5 Team Assignment Network Infrastructure Upgrading and the Case of Huffman Trucking 29. Activity Mode aims to provide quality study notes and tutorials to the students of NTC 360 COMPLETE CLASS in order to ace their studies. NTC 360 COMPLETE CLASS To purchase this visit here: http://www.activitymode.com/product/ntc-360-complete-class/ ...

Words: 817 - Pages: 4

Free Essay

Finance

...MGT 227 Fixed Income Securities and Markets Instructor: Sukwon Thomas Kim Office: Anderson Hall 242 Phone: (951) 827 4995 Fax: (951) E-mail: sukwonk@ucr.edu Quarter: Spring 2014 Lecture time: MW 8:40pm – 10:00pm Classroom: ANDHL 118 Course Website: http://ilearn.ucr.edu/ Office Hours: MW 2:00pm – 4:00pm SoBA Mission Statement Our mission is to develop diverse leaders, propel research-based innovation and promote the sustainable growth of Inland Southern California within the global economy. We harness the powerful resources of UC and our location at the nexus of commerce to create a laboratory for education, research, and productive partnerships across economic enterprises. The strategic activities that propel our mission include: • Conducting basic and applied research in management that explores and informs the creation, development and management of growth; • Providing degree programs that prepare our students to be effective managers and responsible community leaders with a deep understanding of the dynamics of growth in both a regional and global context; • Partnering with business and community leaders through a shared commitment to exemplary growth; and • Delivering educational programs to executives and the public at large that respond to the needs of our local, state, national, and international communities. MBA Program - Learning Goals Professional Integrity / Ethical Reasoning Skills Students will be able to recognize ethical issues, demonstrate familiarity with...

Words: 1081 - Pages: 5

Premium Essay

Afdg

...|Fundamentals of Securities and Futures Regulation | | |Module Code |BAF2407 | |Module Year |2010-2011 | |Module Value |3 | |Module Hours |Lecture | |30 | | | |Tutorial |15 | | | |TOTAL | |45 | | | | | | | | |Pre-requisites |Nil | |Co-requisites |Nil | |Module Aims |To provide students with an understanding of the rules and regulations in regulated | | |activities in Hong Kong. | |Exemption Criteria |Granted on a case-by-case...

Words: 717 - Pages: 3

Premium Essay

Satge 3

...Before you begin this assignment, be sure you: 1. Have completed all previously assigned readings, particularly those assigned in Weeks 3 and 4 of the class. 2. Re-read the “UMUC Haircuts Case Study" and the Stage 1 & 2 assignments, and review the “Walmart Example.” 3. Review Instructor feedback from previous assignment submissions. Purpose of this Assignment This assignment gives you the opportunity to apply your knowledge of the course concepts to develop IT requirements for a technology solution. This assignment specifically addresses the following course outcomes to enable you to: * analyze internal and external business processes to identify information systems requirements * identify and plan IT solutions that meet business objectives Purpose of this Assignment This assignment gives you the opportunity to apply your knowledge of the course concepts to develop IT requirements for a technology solution. This assignment specifically addresses the following course outcomes to enable you to: * analyze internal and external business processes to identify information systems requirements * identify and plan IT solutions that meet business objectives Overview of IT Requirements for a System to Improve the Process at UMUC Haircuts For your Case Study Stage 1 assignment, you performed a Five Forces Analysis and justified Myra's chosen strategy for competitive advantage and the business process that she would like to improve through the application...

Words: 2090 - Pages: 9

Premium Essay

Cis 524 Week 7 Case Study 3

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-7-case-study-3/ CIS 524 WEEK 7 CASE STUDY 3 CIS 524 Week 7 Case Study 3, Case Study 3: Security Due Week 7 and worth 100 points A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register. The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart. After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive. Write a five to eight (5-8)...

Words: 638 - Pages: 3

Premium Essay

Ec-Banking

...Solutions 1. Refer back to the four case studies which were covered as part of Question 7, Week 4. For each of these case studies calculate the Safe Lending Margin and compare it against the proposed borrowing. Comment on the overall strength of the second way out, making particular mention of whether the first and second ways out are independent. Case (a) No further information required. Commercial building and land = $650 K Treated as commercial property and extended at 50% then SLM = $325 K Against a borrowing of $500K ie. undersecured First and 2nd ways out are NOT independent Case (b) No further information required. Mandurah House valued at $560 K Perth House valued at $550 K House (Mandurah) $560 K @ 75% = $420.0 K House (Perth) $550 K @ 75% = $412.5 K 832.5 K SLM of $832.5 K vs against a borrowing of $485 K (ie. $560 K - $75 K) ie. 2nd way out is strong The 1st and 2nd ways out are independent Case (c) You will need to decide what an appropriate percentage rate is for a motor yacht to be extended at. Provide a justification of your choice. Look for some discussion of this point I would expect it to be < 50% Could even be close to zero Either way, the 2nd way out is not strong Perhaps other security will need to be provided Case (d) The total purchase price of the hardware business (of $670,000) is comprised of $360,000 of stock, $160,000 of plant...

Words: 1735 - Pages: 7

Free Essay

Karl Marx

...include the course code in the subject line. First class: Last class: 7 January 2016 7 April 2016 NOTE: No class meeting on 18 February 2016 due to Reading Week cuLearn: On-line components of this course will be managed through cuLearn. Please visit the cuLearn site at least once a week to receive the most current information pertaining to the scheduling of the course and required readings. Course objectives: International institutions have come to play an increasingly important role in global politics in the last century. Arguably the most prominent of these institutions is the United Nations (UN). Established in 1945 and in the immediate aftermath of the Second World War, the UN’s Charter set out the rights and obligations of Member States, and pledged to: “save succeeding generations from the scourges of war”; “reaffirm faith in fundamental human rights”; promote “respect for the obligations arising from treaties”; and “promote social progress and better standards of life in larger freedom”. A brief review of the state of the international system 70 years later, however, has led many to conclude that the UN is incapable of realizing its Charter ideals, and that the organization itself, and the very promise of global governance, is irrelevant. Indeed, challenges in peace and security, development and human rights have repeatedly underlined...

Words: 3716 - Pages: 15

Premium Essay

Assess the Impact on Access Controls for a Regulatory Case Study Learning Objectives and Outcomes

...Week 1 Lab Part 1: Assess the Impact on Access Controls for a Regulatory Case Study Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: 1. Configure user accounts and access controls in a Windows Server according to role-based access implementation 2. Configure user account credentials as defined policy, and access right permissions for each user 3. Create and administer Group Policy Objects for the management of Windows Active Directory Domain machines within the IT infrastructure 4. Apply the correct Group Policy Object definitions per requirements defined by policies and access right permissions for users 5. Assign and manage access privileges as requested in the case study to apply the recommended and required security controls for the user accounts Week 1 Lab Part 1 - Assessment Worksheet Assess the Impact on Access Controls for a Regulatory Case Study Overview Watch the Demo Lab in the Week 1 Learning Space Unit 1, and answer the questions below. The lab demonstrates creating an Active Directory domain as well as user and group objects within the new domain. Directories will be created and permissions assigned based on the required access control as defined in the matrix. Group Policy Objects will also be created and linked to Objects within the domain to enforce security settings. Lab Assessment Questions & Answers 1. What does DACL stand for and what...

Words: 1428 - Pages: 6

Premium Essay

Sexyshubham

...BCO1102 Information Systems for Business 2014 Semester 1 Prepared by Paul Darbyshire Prepared by Paul Darbyshire Welcome Welcome to BCO1102 Information Systems for Business for Semester 1, 2014. For the vast majority of you it will be a compulsory unit of study as it is part of the Business Core in all undergraduate Bachelor of Business degrees. The major focus of this unit is on how computer- based information systems can support decision making in organizations and businesses. Those decisions often need to be made by professionals who come from discipline areas you are studying such as accounting, management, information systems or marketing. One of the most important elements of an information system is people, so all of us need to know what role we can play and what role information and communication technologies (ICT) can play in supporting decisions. This unit will look at the theoretical side of information systems as well as personal productivity tools such as spread sheets and databases. In addition we will look at global trends in information systems and in particular the emerging use of Cloud Computing and Social Networking, which is sometimes called Web 2.0. The unit of study requires the textbook Introduction to Information Systems by Rainer, Prince and Cegielski 5th Edition. The textbook is used for the theory and some of the practical work in tutorials. All reading for this subject during the semester is assigned from this textbook. Feedback from previous...

Words: 3033 - Pages: 13

Free Essay

With the Development of Technology, More and More Robots Are Used in Various Fields,

...University of Mumbai B.E Information Technology Scheme of Instruction and Evaluation Third Year -Semester VI Scheme of Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access...

Words: 3868 - Pages: 16

Premium Essay

Acc544 Syllabus

...in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Louwers, T. J., Ramsay, R., Sinason, D., & Strawser, J. (2007). Auditing and assurance services: A look beneath the surface (2nd ed.). New York, NY: McGraw-Hill. McCarthy, M. P. & Flynn, T. P. (2004). Risk from the CEO and board perspective: What all managers need to know about growth in a turbulent world. New York, NY: McGraw-Hill. Raval, V. H. & Fichadia, A. (2007). Risks, controls, and security: Concepts and applications. Hoboken, NJ: John Wiley & Sons. Weygandt, J. J., Kimmel, P. D., & Kieso, D. E. (2008). Managerial accounting: Tools for business decision making (4th ed.). Hoboken, NJ: John Wiley & Sons. All electronic materials...

Words: 1676 - Pages: 7

Premium Essay

Bff5270

...Copyright©MonashUniversity. NOT FOR RESALE. All materials produced for this course of study are reproduced under Part VB of the Copyright Act 1968, or with permission of the copyright owner or under terms of database agreements. These materials are protected by copyright. Monash students are permitted to use these materials for personal study and research only. Use of these materials for any other purposes, including copying or resale, without express permission of the copyright owner, may infringe copyright. The copyright owner may take action against you for infringement. BFF5270: Tutorial Questions Topic 1 – 1A: Introduction to Funds Management 1B: Chartered Financial Analyst (CFA) Ethics Submission due: 2.00pm on the day of the lecture in Teaching Week 2 Note: Tutorial questions are sourced from SPH-BKM = BFF5270: Funds Management, CFASPH = CFA Standards of Practice Handbook and other sources mentioned in the question itself. Students’ work that is copied from solutions or another student(s) or shared and submitted as your own constitutes cheating and/or plagiarism and will not earn any marks. Please be aware that BFF5270 teaching staff can use text-matching software such as Turnitin to check for plagiarism. 2    Question 1 Teachers Insurance and Annuity Association – College Retirement Equities Fund (TIAA– CREF) is a Fortune 100 financial services organisation in the US. It is the leading retirement provider for people who work in the academic...

Words: 650 - Pages: 3

Premium Essay

Case Study Week 5

...Case Study Week 5 Eric A Brock DeVry University Case Study Week 5 Before I explain how you can apply risk management to our corporate security policy, I want to take a look at the basics of risk management. The risk management process involves answering three simple questions, what assets do you have that are worth protecting, what are the known threats to those assets, what can you do to keep those threats from actually occurring. When it comes to the assets that are worth protecting, your mind probably immediately jumps to your company's hardware inventory. First, it should educate the company's employees as to what is expected of them regarding cybersecurity (prevention). Second, it should be a guide that dictates the appropriate response to a variety of security incidents. To accomplish these two goals, you need to limit your policy to a manageable size. If you're trying to educate users on security strategies, keep the documentation short and simple. Users will usually ignore anything that's over a couple of pages long or that's overly complex. If you want to get technical, the real asset is your data. Since authentication credentials are the gateway to your data, they should also be treated as an asset that needs protecting. Clearly, passwords can be disclosed by users with no malicious intent. The resulting damage, however, can be just as serious as if the security breach were malicious. Therefore, when making your list of known...

Words: 614 - Pages: 3

Premium Essay

It and Its Scope

...Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited. In line with this Faculty of Technology of University of Mumbai has taken a lead in incorporating philosophy of outcome based education in the process of curriculum development. Faculty of Technology, University of Mumbai, in one of its meeting unanimously resolved that, each Board of Studies shall prepare some Program Educational Objectives (PEO‟s) and give freedom to affiliated Institutes to add few (PEO‟s) and course objectives and course outcomes to be clearly defined for each course, so that all faculty members in affiliated institutes understand the depth and approach of course to be taught, which will enhance learner‟s learning process. It was also resolved that, maximum senior faculty from colleges and experts from industry to be involved while revising the curriculum. I am happy to state that, each Board of studies has adhered to the resolutions passed by Faculty of Technology, and developed curriculum accordingly. In addition to outcome based education, semester based credit and grading system is also introduced to ensure quality of engineering education. Semester based Credit and Grading system enables a much-required shift in focus from teacher-centric to learner-centric...

Words: 10444 - Pages: 42

Premium Essay

Master Student

...Royal University of Law and Economics Case Study 26 “JetBlue Airways IPO Valuation” Lecturer: Kou Lim Hong Prepared By: 1. Ms. Khoun Davy 2. Ms. Khoun Dalin 3. Ms. Chiem Sothana 4. Mr. Soksithika 5. Mr. Oag Sothearith 6. Mr. Mov Vandara MFM, Group 2 team 6 2011-2012 Outline of The Presentation I. II. Introduction of Case Study Main Problem III. Literature Review IV. Case analysis V. Conclusion Outline of The Presentation I. II. Introduction of Case Study Main Problem III. Literature Review IV. Case analysis V. Conclusion Introduction of Case Study JetBlue Airway Background  JetBlue airways are a low cost airline established in July 1999 by David Neeleman.  David Neeleman was experienced in the operations of airline and start up airlines.  The airline was to provide new levels of service in the airline travel industry, concentrating on customer service and low fares. Introduction of Case Study JetBlue Airway Background  David Neeleman plan was to commit to innovation in people, policies and technology to keep the companies planes full and thus the company profitable. To ensure this goal and the company’s future David Neeleman assembled and impressive management team and group of investors. JetBlue’s COO was to be David Barger ex-vice president of Continental Airlines. John Owen who was executive vice-president and treasurer of Southwest Airlines agreed to become JetBlue’s CFO. Introduction of Case Study JetBlue Airway Background  David...

Words: 982 - Pages: 4