I am hired as an Information Security Engineer for a videogame development company. The organization network structure is given in the diagram. I was notified that malicious activities are taking place in the network structure. They can effect protection of the intellectual property and highly sensitive data maintained by the organization. I am assigned to resolve these issues that arise in the network structure. In this document I will analyze and assess potential malicious attacks and threats that may be carried out against the network along with potential vulnerabilities that may exist in the documented network. Also I will tell the potential impact of all malicious attacks & threats and identified vulnerabilities to the network and …show more content…
In a hijack attack, a hacker can destroy the connection between two parties and get hold on it. Victim still assumes that he is talking to original party and can send him your important data. In a spoof attack, the hacker modifies the source address of the packets he or she is sending so that they appear to be coming from someone else. This may be an attempt to bypass your firewall rules. In a buffer overflow attacker gains administrative access to the system and he can modify or remove anything he wants. In this type of attack, the attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability.
In password attack hacker crack the password which can be stored anywhere in the network whether in protected file or database. All these above mentioned attacks and threats can be malicious to Videogame Development Company. These can impact network structure badly. Lack of Appliance of SSL (Secure Socket Layer) technology can perform security threats and malicious attacks and for network it will be a negative impact. There will be also a negative impact, if system do not uses close system (Firewall), which provides services until network devices are switched on (1). Attackers attack the network by identifying a weak point in the network and create a network threat. There are four primary classes of threat: Unstructured Threats, Structured Threats, External threats and internal
The next step is to identify the risks, threats and vulnerabilities. Hackers attack from the Internet, failure of hardware or software systems, or network outages are the most common threats. And common vulnerabilities are absence of firewall and antivirus software, absence of update patches, not adequately trained associates etc.
* Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure
2. Active Attack: Active attacks are those attacks where the attacker takes malicious action in addition to passively listening to ongoing traffic e.g. attacker might choose to modify packets, inject packets or even disrupt network service. The misbehaving node has to bear some energy costs in order to perform some harmful operation like changing the data. Active attacks cause damage and are malicious which often threaten integrity, availability of the network. These type of attacks can be internal or external [7].
In this report I will be describing the ways in which networks can be attacked, also be giving real life example of each of the below.
Lab #1 – Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure
There are many threats that CanGo can face by joining online gaming. Cyber security, FCC regulations, and Hardware and software issues are a few that must be addressed. According to Computer Weekly Top Five Threats, security can be grouped in three layers. The first layer is an intrusion prevention system that monitors user traffic. The second layer is the installation of a security management system that will provide anti-virus for the virus and protect against back door entry. The third layer being a thorough assessment of which systems are most open to cyber-attacks. New technologies and ensuring hardware and software can meet the ever changing needs of online gaming will be necessary so that products and services do not become obsolete.
We can say that the data and sensitive information that is sent over computer network be vulnerable to attacks by hackers.
Threat modeling is the process of optimizing an organizations’ security of their network by finding vulnerabilities in that system, and then deploying countermeasures to protect against those threats should they happen in the future. If a company wants to know what vulnerabilities they may have then threat modeling is an excellent way of determining these threats. An individual threat is when an event occurs that has a negative impact on an organization’s daily operations. (Rouse, 2006). These negative impacts can manifest themselves in many ways from damaging the reputation of that organization to interrupting the functions of that organization. These threats can be in the form of destruction or stealing sensitive data, cracking of weak passwords, malware, phishing, or other scams and frauds. The goal of this paper is to address how the organizations code of ethics and security policies apply, what specific security policies can be deployed, and to identify the impact of asset security standards and governance. I chose Northrop Grumman as the focus of my paper
I previously identified several types of attacks, threats and vulnerabilities that exist with your multilayered network. I have now been charged with the responsibility of developing a strategy to deal with these risks as well as a plan to mitigate each risk to reduce the impact that each will have on your organization.
They exploit network design weaknesses such as sending ping requests to death, or establishing computationally heavy tasks such encryption and decryption of the victim. The attacks have become rampant because hackers have availed the attack tools to help adversaries bypass the weak security measures in place. The attacks can be direct or reflector (Kinicki, 2012).
An Information Security Engineer for a video game development company has many things to be concerned about. A few items of concern are compromised game servers, DDoS, and Threat Group-3279 (TG-3279). For each of these malicious attacks and threats there is a strategy for addressing the risk. In addition there are also potential controls that the company could use to mitigate each risk. Risk management, control identification, and selection processes are important.
The computer networks should be made secure such that the hackers could not access the interior of the network. This should be achieved through the strong authentication, antivirus software, firewalls, and intrusion detection systems.
Outsider attackers often called hackers because they gain access to system without authorization or permission from the owners or legitimate user. With information technology, comes increase risk of fraud and information theft. Hackers can steel sensitive information from one organization and sell it to a
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.
Vulnerabilities in a system are weaknesses present in the system or lack of a counter measure which has been placed to secure the system from exploitation and attack. The weakness of the countermeasure could be related to hardware or software. Any procedural or human weakness can also be exploited to threat the network setup. Basically a threat agent gives rise to a threat, which in turn exploits the vulnerability that gives to a risk. Therefore it is important to safeguard the system against the vulnerabilities to protect it from any type of attack.