Beruflich Dokumente
Kultur Dokumente
ASSIGNMENT TERM 01 2012 | By: Malak Student ID: Lecturer Name: Miss Marwah
Table of Contents
Table of Contents..................................................................................................................................2 What are IT attacks?.............................................................................................................................3 Virus Attack..........................................................................................................................................4 System Compromise.............................................................................................................................5 Spam Mail ............................................................................................................................................5 Port Scanning .......................................................................................................................................6 Website defacement..............................................................................................................................7 BACKING UP OF IMPORTANT FILES...........................................................................................8 Acts of Human Error of Failure.......................................................................................................9 Deliberate acts sabotage or vandalism...........................................................................................10 Deliberate acts of theft....................................................................................................................10 Deliberate software attacks.............................................................................................................11 Forces of nature..............................................................................................................................11 Technical hardware failure.............................................................................................................12 Technical software failure..............................................................................................................12 .............................................................................................................................................................12 References...........................................................................................................................................12
Question 1:
security threats
Virus Attack
A virus is a small piece of software that piggybacks on real programs. A computer virus is a computer program that can reproduce and stretch from one computer to another. Viruses can increase their chances of dispersal to other computers by infecting files on a network file system or a file system that is accessed by other computers. The term "virus" is also normally, but incorrectly used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or inflict disaster. Virus attack belongs to Malware Category. Programs in this category are generally considered to cause a significant security risk to the user's system and/or information. The actions taken by malicious programs can take range from stealing the user's confidential data, infecting the computer resulting in completely crashing the user's computer.
System Compromise
A compromised computer is one that has been hacked by a cracker, which is a person who breaks into a computer's systems with malicious intentions but it can also occur either through automation. A compromised system can be used to attack other systems and is generally considered a threat to all other systems connected to a network. Some may do this to send mass emails. Others may compromise a computer to steal personal information. A compromised system is more than just a hacked computer. Besides being a threat, a compromised system can also be a problem, exposing many types of sensitive data, such as: Social Security numbers (SSN) credit card numbers (CC) personal information, including passwords to a users bank account, e-mail and other online accounts
It is virtually impossible to determine the full scope of an attacker's reach into a compromised system, and the server should not be trusted for production use. It belongs to network threat.
Spam Mail
Spam mail has different identities like email spam, junk email or unsolicited bulk email. It is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. Networks of virus-infected computers are used to send about 80% of spam. Spammers collect email addresses from different places like websites, chat rooms, customer lists, newsgroups, and viruses which harvest users' address books, and are sold to other spammers. Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup. There are different approaches of spam which include appending, image spam, blank spam and backscatter spam. Although computer experts are constantly designing better and better ways to filter out unwanted mail, the spammers are also constantly devising ways to get around those technical solutions. It is a very frustrating situation for users as well as for technical support personnel. It is a basic fact of Internet life that if you use the Internet, you will get unsolicited email. Spam mail belongs to Spoofing attacks that are aimed at obtaining user account information. Spoofing identity attacks typically affect data secrecy.
Port Scanning
Port Scanning is the name for the technique used to identify open ports and services available on a network host. It is similar to a thief going through your neighbourhood and checking every door and window on each house to see which ones are open and which ones are locked. All machines connected to a LAN or connected to Internet via a modem run many services that listen at wellknown and not so well-known ports. TCP ports are commonly monitored but UDP ports are not. By port scanning the attacker finds which ports are available (i.e., being listened to by a service). It is sometimes utilized by security technicians to audit computers for vulnerabilities; however, it is also used by hackers to target victims. It can be used to send requests to connect to the targeted computers, and then keep track of the ports which appear to be opened, or those that respond to the request. Port scanning software, in its most basic state, simply sends out a request to connect to the target computer on each port sequentially and makes a note of which ports responded or seem open to more in-depth probing. Hackers typically utilize port scanning because it is an easy way in which they can quickly discover services they can break into. They also use port scanners to conduct tests for open ports on Personal Computers that are connected to the web. Port scanning belongs to unauthorized access threat category.
Website defacement
Website defacement is the replacement of the original home page by a system hacker that breaks into a web server and alters the hosted website creating one of his own. Defacement is in general a kind of electronic graffiti, although recently it has become a means to spread messages by politically motivated cyber activist or hackers. This is a very general form of attack that seriously damages the trust and the reputation of a website. Detecting web page defacements is one of the main services for the security monitoring system. Network firewalls cannot guard against all web vulnerabilities. For precaution we should install additional Web application security to lessen the defacement risk. It is also important that only a few authorized users are allowed root access to a websites contents. Website defacement belongs to Spoofing attacks which involve providing fake information about a principal's uniqueness to obtain unauthorized access to systems and their services.
Question 2
they cannot be damaged. That way, no matter what happens to your computer, you can have security in the fact that all of your files are available in backup. It is essential that we always back up our important information and have a plan for recovering from a system failure due to the following threats: Acts of human error of failure Deliberate acts sabotage or vandalism Deliberate acts of theft Deliberate software attacks Forces of nature Technical hardware failure Technical software failure
Backup should be an essential part of our computing experience if we spend great amounts of time on computer and/or use computer for important personal or business dealings. There are too many stories of people who have lost all of their files due to certain reasons. When you backup your files, you are storing your files separately from your computer.
3. Accidental formats 4. Misplacement of CDs or Memory sticks 5. Administration errors 6. Inability to read unknown file format 7. Inexperience 8. Improper training 9. Incorrect assumptions That can happen to anybody at any time regardless of how expensive or sophisticated the storage device. Keeping 3 or 4 complete copies of your data in multiple places on multiple formats improves your chances of recovery. In the physical environment a potential act of human error or failure can be represented by an employee accidentally spilling coffee on his or her laptop computer. A compromise to intellectual property can include an employee without an appropriate security clearance copying a classified marketing plan.
Forces of nature
Forces of nature or acts of God pose the most dangerous threats, because they are unexpected and can occur with very little warning. These threats can disrupt not only the lives of individuals, but also the storage, transmission, and use of information. These include fire, flood, earthquake, lightning, landslide, mudslide, tornado, severe windstorm, hurricane, typhoon, tsunami as well as volcanic eruption. Forces of nature disrupt not only individual lives, but also storage, transmission, and use of information. Organizations must implement controls to limit damage and prepare contingency plans for continued operations.
References
Information Technology Risks | eHow.com http://www.ehow.com/info_7954636_informationtechnology-risks.html#ixzz1ngxCYJ2G