Caleb Olumuyiwa
N/T 2580 Introduction To Information Security
Week 2 A ssigment
Define Key Terms.
Adware | A software program that collects infor- mation about Internet usage and uses it to present targeted advertisements to users.
Asset | Any item that has value to an organization or a person.
Attack | An attempt to exploit a vulnerability of a computer or network component
Backdoor | An undocumented and often unauthor- ized access method to a computer resource that bypasses normal access controls.
Black-hat hacker | A computer attacker who tries to break IT security for the challenge and to prove technical prowess.
Cookie | A text file sent from a Web site to a Web browser to store for later use. Cookies contain details gleaned
…show more content…
Phreaking | The act of studying, experimenting with, or exploring telephone systems, telephone company equipment, and systems connected to public telephone networks.
. Pop-up | A type of window that appears on top of the browser window. Pop-ups generally contain ads. Although pop-ups are not strictly adware, many adware programs use them to interact with users.
Replay attack | An attack in which the attacker captures data packets from a network and retrans- mits them to produce an unauthorized effect Rootkit | A type of malware that modifies or replaces one or more existing programs to hide the fact that a computer has been compromised. script kiddie | A person with little or no computer- attack skills. Script kiddies simply follow directions or use a cookbook approach without fully under- standing the meaning of the steps they are performing. security breach | Any event that results in a violation of any of the A-I-C security tenets. session hijacking | A network attack in which the attacker attempts to take over an existing connection between two network computers. smurfing | A DoS attack that uses a directed broad- cast to create a flood of network traffic for the victim computer sniffer | An application that captures traffic as it travels across a network spam | Unwanted e-mail or instant messages spear phishing | An e-mail or instant-message
Ransomware is a type of malware that limits access to a computer system that it affects. Just as its name goes, it then asks for ransom payment to pay to its creator in order for the limitation to be taken away. Some of these malwares encrypt files on the hard drive while others just lock up the system and display messages persuading the user to pay the ransom (Michael). There are two types of ransomware, one that locks the screen and displays a message that prevents you from accessing the computer, and the other that encrypts files on a systems hard drive and prevents one from opening them (Blue).
You sure have heard before terms such as virus, worm, Trojan or rootkit when people discuss internet security. These names describe types of programs used by internet criminals or hackers to hack and take over computers and mobile devices. All of these different terms can be simply called malware.
The purpose of this paper is to touch on the issue of Hacking. It will go into detail about the history, evolution, future and prevention of Hacking. In addition, this paper will discuss different types of hackers and their motivation behind hacking. This paper examines the major impact caused by malicious hackers and give modern examples of such attacks. To conclude, it will predict how hacking will be in the near future and give the precautionary measures Information Security professionals can take to mitigate the risk of being victimized.
A third method of gaining unauthorised access is networks spoofing. In network spoofing a system presents itself to the network as though it were a different system. Network spoofing occurs in the
The word hacking, usually associated with information technology, is a term used for the development of creative solutions for a problem by someone in a non-professional environment. With the introduction of personal computers and the internet, anyone could create solutions to problems in computer science. This led to the emergence of “hacker culture”, leading to the decentralization of computer industry (Hicks, 2014).
Spyware is Software that enables a user to obtain information about another's computer activities by transmitting data from their hard drive.
This type of attack is usually used for bringing down the systems at once by constantly sending massive amount of URL requests or overloading the server’s network traffic with bogus information. This is purposefully done to either a user’s system or the whole network to interrupt it partially or render it completely useless. When the system is brought down to its knees, the crackers either transform the complete system/website or do some manipulate some particular component to benefit from
Which individual is considered to be a script kiddie who uses automated tools to inundate a Web site with a barrage of network traffic, usually resulting in a denial of service?
This attack is very similar to the Quick Double Switch, but only difference is that the attacker maintains remote access to the victim's machine. This access allows the attacker to interact with the victim’s machine from time to time, execute arbitrary code, and collect that code’s output.
Hacking in computer networking is the desire to manipulate the normal behaviour of a network connection or a connected system, a hacker is the person who is instigating the hack. In today’s society, we generally refer to any malicious programming attack over the internet or a network to be hacking. Hacking originated between the 1950s and 60s by M.I.T engineers, they originally were meant for learning and experiment purposes and usually took place at the ‘model train club’. However, these attacks soon became popular outside of M.I.T with perpetrators experimenting with modifying telephones for long distance calls for free, overtime with the expansion and popularity of the internet, cyber-attacks we today refer to as hacking became more popular.
Malicious attacks can come in many forms but generally speaking attacks fall into one of four categories Fabrications which deception is involved to trick users, Interceptions which involve eavesdropping on transmissions and unauthorized redirecting of those transmissions, Interruptions which causes a break in communication and a blockage of data transmission, and Modifications which alters the data in transmissions (Kim & Solomon, 2012). Attacks such as Brute-force attacks, Dictionary threats, Address spoofing, Hijacking, Replay attacks, Man-in-the-middle attacks, Masquerading, Social engineering, Phishing, Phreaking, and Pharming are all examples of attacks that can have damaging effects on a computer network or system (Kim & Solomon, 2012).
Adware is a software application wherein advertising banners are displayed whilst an application is running. The ads are brought thru bars or pop-up windows that appear on the application's client interface. Adware is normally produced for computer systems, but will also be found on mobile devices. The justification for adware is that it assists recover programming development charges for the software program developer, and reduces or removes the value for the user.
Security is an extent of the ability of the system for protecting information and data from unauthorized access however still giving access to systems and people that are authorized. Attack can be seen as an action taken against a computer system having the intent of causing harm, to it and this may take numerous forms. It may refer to attempts aimed at accessing services or data, or modification of data, or might be an intention of denying services for legitimate users.
Hacker: refers to a type of computer hacker who is involved in computer security/insecurity, specializing in the discovery of exploits in
Adware: This is software that is typically installed by the computer user because of some free feature, and the developer gets revenue by reporting your web activity to advertisers so that targeted ads can be presented to you (Stallings & Brown, 2015).