Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

1429 Words Jan 13th, 2018 6 Pages
Spear phishing or phishing is a potential attack that can occur through the email server. Using this kind of attack the hacker will create a fake website that is identical to a popular website for a client ADDIN EN.CITE Kim2012318(Kim & Solomon, 2012)3183186Kim, D.Solomon, M.Fundamentals of Information Systems Security2012Sudbury, MAJONES & BARTLETT - U9780763790257http://books.google.co.ke/books?id=-agjhFspvFMC( HYPERLINK l "_ENREF_2" o "Kim, 2012 #318" Kim & Solomon, 2012). The main purpose of this attack will be to collect information from the company users. The information can range from sensitive data regarding the company or personal employee information. The effects of this attack can be quite detrimental to the company as the users will not be aware of the phishing website. The information that the hacker collects could be used to access the network and sensitive data on the servers. The company will be faced with three main threats if this attack is successful namely data alteration, information disclosure, or data destruction. To protect against this attack, the company should install spam filters, which can detect attachments or malicious links sent via email.
The wireless access point can be attacked by eavesdropping. This kind of attack will read and capture all…
Open Document