Paper on IT Vulnerabilities: Analyze the basic attacks that occur in cyberspace
Analyze the basic attacks that occur in cyberspace. Each type of threat actor (cybercriminal, hacktivist, nation-state) attempts to achieve certain goals through these attacks. Understanding the nature of the attacks helps you to understand what is needed to protect your systems and networks. This assignment requires you to perform research and analysis.
Please describe the following types of attacks as they occur in cyberspace:
fraud
destructive attacks
intellectual property theft
denial of service
Part 1
For each type of attack above, find and describe one documented example, provide the motivation for the attack, describe the damage that occurred (if any), analyze the existing vulnerabilities, and determine the factors that contributed to the success of the attack. What was the impact of the attack? What prevention techniques were in place or were attempted, and what prosecution, if any, occurred? Use the Internet and the library to conduct your research.
Please be sure to use at least one printed media reference and to cite all of your references using American Psychological Association (APA) format. See this link (http://www.umuc.edu/distance/odell/cip/vail/students/citation/examples.html) for information on APA style. Your references will not count toward your page count.
Part 2
Please visit the Common Vulnerabilities and Exposures (CVE) database (http://cve.mitre.org/) and provide a brief description of the site in your response.
Analyze the basic attacks that occur in cyberspace. Each type of threat actor (cybercriminal, hacktivist, nation-state) attempts to achieve certain goals through these attacks. Understanding the nature of the attacks helps you to understand what is needed to protect your systems and networks. This assignment requires you to perform research and analysis.
Please describe the following types of attacks as they occur in cyberspace:
fraud
destructive attacks
intellectual property theft
denial of service
Part 1
For each type of attack above, find and describe one documented example, provide the motivation for the attack, describe the damage that occurred (if any), analyze the existing vulnerabilities, and determine the factors that contributed to the success of the attack. What was the impact of the attack? What prevention techniques were in place or were attempted, and what prosecution, if any, occurred? Use the Internet and the library to conduct your research.
Please be sure to use at least one printed media reference and to cite all of your references using American Psychological Association (APA) format. See this link (http://www.umuc.edu/distance/odell/cip/vail/students/citation/examples.html) for information on APA style. Your references will not count toward your page count.
Part 2
Please visit the Common Vulnerabilities and Exposures (CVE) database (http://cve.mitre.org/) and provide a brief description of the site in your response.
0 comments:
Post a Comment