100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary unit 7.1 .IT Systems Security and Encryption P1,P2, P3, P4, M1, M2, D1 £38.19   Add to cart

Summary

Summary unit 7.1 .IT Systems Security and Encryption P1,P2, P3, P4, M1, M2, D1

 189 views  0 purchase

Tasks P1,P2, P3, P4,M1,M2,D1

Last document update: 2 year ago

Preview 3 out of 18  pages

  • July 12, 2022
  • October 15, 2022
  • 18
  • 2021/2022
  • Summary
  • baiting attacks
  • physical
All documents for this subject (38)
avatar-seller
businessopportunity
P1- Explain the different security
threats that can affect the IT
systems of organsiations.

Here are 4 types of Security threats.,

• Internal
• External
• Physical
• Social Engineering and Software threats



Software threats

Malware
This is an app which sets up destructive software in the system of user. Moreover,
Software detects activity of user and gather entire classified information of user. Here
are several kinds of malwares software shown below:

• Virus – virus produces a duplicate copy of itself that expand all over the files of
computer and doesn’t bring in notice of user. It enters the duplicated print of
itself into the different computer program occurs.
• Worm – Worms are related to viruses. Worm is a duplicate code which arrives
through emails that appear authorized.
• Trojan horse – Trojan horse is another type of malware that declares itself to be
original & misguide people of its actual purpose. Additionally, it works in the
background and tries to make an entrance into user’s system.
• Ransomware – Ransomware prevents access to the system of user and force them
to pay the price to reinstall the right to have access. In 2021, a city called
Baltimore was attacked by ransomware known as Robbin hood, it was
extremely powerful that it halted all the activities in the city which includes,
property transfers, tax collection and government emails for weeks. It was an
extremely expensive attack for the city as it coted them more than $18 millions.

, • Spyware – Spyware is the type of malware that get access to the system, steal
confidential information and the data about internet usage without bringing
these events into the user’s notice.
• Bonet - Bonet are also one of the malwares. They spread the infection all over
the network which is connected by many devices altogether. They are mainly
known and used for transferring spams
• Backdoors- backdoor is type of malware makes the normal authentication
procedures ineffective to get high-level access to a system.
• Bots- bots are type of a program that works according to the set of instructions
automatically. For example., automated replies, etc.

Phishing
Phishing is one of the cybercrimes in which people are targeted through emails,
phone calls by a stranger who acts like a legitimate institution to trick people so they
can gain access to classified information such as credit cards, debit cards and
passwords.

Here is the real-life example of phishing email attack. In December 2020, a phishing
attack occurred in USA at healthcare provider. In this attack attackers attacked two
employees. Furthermore, the attacker successfully managed to gain access to the
employees’ email accounts, in result they gained access to the personal details of
over 100,000 elderly patients and these personal details included names, birth, bank
and financial information, insurance information, social security numbers, driver’s
license numbers. This unauthorised access was maintained by attackers for a whole
week.

SQL Injection
SQL is one of the dangerous cybercrimes in which an attacker uses SQL code to
dominate a database of a website and get access to valuable information.

Here is the real-life example of SQL injection happened which is known as Ghost
Shell attack. In this attack hackers belonged to APT group team Ghost Shell aimed at
53 universities using SQL injection. In result, they stole and published personal
records around 36,000 to students, staff and faculty.

Man in the Middle (MITM) Attack
MITM attack occurs when two people are having a conversation and a third party
meaning third person, interferes into the conversation and gather sensitive,
potentially valuable information. For example., Public WIFI, a third person (hacker)

, might steal your confidential information such as bank details, passwords.

Denial of Service (DOS) and Distributed Denial of Service
(DDoS).
DOS is one of the most important security threats that makes the machine or network
resources inaccessible to its regular users. This attack does it through sending it
controversial information which causes a crash in system.
Distributed denial of service happens to interrupt the regular traffic of a targeted
server by putting immense pressure through high internet traffic on its surrounding
infrastructure.

DNS Spoofing
DNS spoofing is a type of attacks that hacks the Domain name system. And those
changed DNS records can be used to drive the online traffic from the original
website/platform to a fake, fraud website which looks like the original destination.

Backdoors
Backdoors makes the normal authentication procedures ineffective to get high-level
access to a computer system.

Form jacking
Form jacking utilize the website’s form pages by making use of a JavaScript to steal
information from the form.

The attacks happened on Ticketmaster feedify, British airways are examples of form
jacking.

Password Attack
Password attack is an attempt of breaking password. Attackers try to break your
password through using different tools such as John the Ripper, it helps them to
break the password.

Here is the real-life example of brute force on passwords. This time target was
Northern Irish Parliament in 2018, in this attack accounts of some of the members were
compromised. After the investigation, it was revealed that external sources were used
to start the attack. Furthermore, attackers successfully accessed the mailboxes of
assembly member through trying multiple passwords. The parliament took instant
action and removed all the affected accounts, recommended that the members
change their passwords and make them stronger. Particularly they were recommended

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller businessopportunity. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £38.19. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67474 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£38.19
  • (0)
  Add to cart