StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Threats - Assignment Example

Cite this document
Summary
The assignment "Cyber Threats" focuses on the critical analysis of the major issues in the threats that are normally found to be common on the internet and suggests the possible mitigation strategies that can be applied. Cybercrime is becoming a threat to many organizations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Cyber Threats
Read Text Preview

Extract of sample "Cyber Threats"

? Cyber threats Number: Lecturer: Introduction With cybercrime becoming a threat to many organizations, there are many threats that have been recognized and pose to be a threat to the normal operations of an organization. There are various types of attacks that have been recognized. This paper will focus on the threats that are normally found to be common on the internet and suggest the possible mitigation strategies that can be applied. ARP poisoning Address Resolution Protocol spoofing, also referred to as ARP flooding, or ARP poisoning/ARP poison routing is a mechanism that is employed when one wants to attack an Ethernet wireless or wired network. This technique may allow the attacker to undertake packet sniffing. In case of email, the attacker will sniff the traffic sent by one host to another host ion the network (Tan & Ruighaver 2005). In the normal operations of ARP, there will be broadcasting of host IP address and MAC addresses. When some host wants to send some information to a certain host, it will send a broadcast asking who has a certain IP address. The host with the respective IP address will reply to the request and will do so with the correct IP address and the MAC address. This communication happens with a lot of gullibility (Salomon &Cassat 2003). This is because, ARP does not have authentication. The reply and the host which replies that it has the said IP address and MAC address will not be authenticated. In ARP communication, there is no authentication of the hosts. The host replying will be taken to be correct. ARP does not have a mechanism of correcting the information that it gets from the hosts which are communicating in the network (Salomon & Cassat 2003). Since there is no authentication of the ARP requests and replies, the attacker will insert a wrong IP address to a computer cache. The ARP request will then be fed with the wrong IP address. This is called ARP poisoning, that is the ARP table has been poisoned with wrong information. The attacker manages to lie to the machines and to the people in the network (Russell & Gangemi 2011). What these attacks do is that they will get what is taking place with the two parties. When the parties communicate, the attacker will get the packets and get the email password of either parties or even both parties. They can then use the passwords to undertake attacks (Peltier 2005). The possibility for an IP address to be associated with any given MAC address is another loophole for attacks. They are able to undertake many forms of attacks to the unsuspecting users and hosts in the network. In this state, other forms of network attack can be experienced. Other common forms of attacks that can be experienced include man-in-the-middle attacks, MAC flooding, and denial of service attacks (Orebaugh, Ramirez & Beale 2007). Man-in-the-middle attacks This is an attack which is common in local area networks. This attack is a form of active and aggressive eavesdropping where the attacker will create independent connections between the parties communicating so that the attacker will feign either parties communicating. In the end, the parties communicating will think that they are having a private communication and yet in the real sense, the communication is being controlled by eth attacker (Neumann 2006). A hacker can make use of ARP spoofing/poisoning to attack the communication between communicating parties. This can sim0ply be undertaken by having the attacker sending ARP reply to a router. The router could be communicating with computer A. The router will send information regarding its IP address and the MAC address thinking that the requesting agent is computer A. After getting this information, the attacker will also send an ARP replies to machine A. Machine A will respond to the reply thinking that the machine is a router. It will then send information to the attacker. After getting the IP and MAC address, the attacker will then use the operating system characteristic that is referred to as IT forwarding. This feature will enable the attacker to forward any information to the hosts in the network (Matt 2003). MAC flooding MAC flooding is ARP cache poisoning technique that is targeted at switches. There is a difference between switches and hubs. Switches send network packets to particular host that was meant to get the information. Hubs just rebroadcast all the information and traffic they get. They do not have a mechanism which will enable them to check where the traffic is headed. There are some switches which go to hub mode when they become overloaded. Hackers will take advantage of this by ensuring that traffic is overloaded to the switch so that they get access to the traffic and therefore be able to packet sniff the network. This is possible when the switch is in the hub mode (Lindup 2006). Denial of service attack A hacker can maliciously associate an IP address which is very important to a MAC address which is false. An example is that a hacker can send an ARP reply by associating the IP address of the router to a MAC address that ha nor relation or association with any host. With this, the computers in the network will be thinking that they know the default gateway and will be sending packets to this false gateway. In other words they will be sending packets to the wrong “router”. The email which is purportedly sent in a network will then be sent to the wrong destination. The email details will therefore be disclosed to the wrong people. This is how denial of service attacks takes place (Layton 2007). Mitigation strategies There are mitigation strategies that are used to eradicate the risks that are associated with email communications. For spoofing and ARP poisoning, one way on which this can be mitigated is by using IP addresses which are static. Also the network administrator should make use of ARP tables which are static. By exploiting CLI commands in UNIX and windows operating systems, the network administrator will have an understanding of all IP addresses that are found in the organization's network. These commands include such commands like ipconfig/all in Windows and ifconfig in UNIX, the network administrator will get all address of hosts ion the network (Baskerville 2008). For the large networks, the network administrator will be required to have port security features that are available for the switch. Switches should be protected with this approach. One example of a port security feature is to have one MAC address to be associated with each of the physical ports of the switch. This will prevent the attackers from changing the MAC address of their machines. This way, switch security features will have been eradicated as the attackers will not have a chance to change the MAC addresses. The issue of spoofing will also be eradicated with this move. This is because it will be hard for attackers to change the MAC addresses of the computers which are being used (Badenhorst & Ellof 2007). Another mitigation strategy is to have ARP monitoring tool installed in the network. It is important to have network administrators understand what ARP tool will do. With the use of this tool, attacks from ARP poisoning will be avoided. It will make it easier to safeguard the security and the operation of the switches because ARP reporting and replies will be protected (Angell 2007). To prevent phishing and other email security vulnerabilities, organizations should install enterprise level security software in the network. It is advisable that this security software be able to check messages which are going out of the network and also those that are coming into the network. This will prevent messages from transmitting spam from networks that have been compromised (Aceituno 2005). Also, users should be advised to change passwords frequently. This will prevent attackers from using brute force attack and, therefore, making it easier to guess passwords that are used by staff. Users should also be advised to use passwords that are strong. They should not use dictionary words or any combination of their names. Staff should also be trained about the internet security issues so that they are knowledgeable. Most users are attacked because they are not aware of what is going on. Training should be conducted about the importance of securing their passwords. References Aceituno, V. (2005). On information security paradigms. ISSA Journal , 6 (3), 2-34. Anderson, R. (2001). Security engineering: A guide to building dependable distributed systems. New York: John Wiley and Sons. Angell, I. (2007). Computer security in these uncertain times: The need for a new approach. The Tenth World Conference on Computer Security, Audit and Control, (pp. 34-65). London. Badenhorst, K., & Ellof, J. (2007). Computer secutity methodology: Risk analysis and project definition. Computer and Security , 8 (9), 339-346. Baskerville, R. (2008). Designing information systems security. New York: John Wiley and Sons. Layton, T. (2007). Information security: Design, implementation, measurement, and compliance. Boca Raton, Florida: Auerbach Publications. Lindup, K. (2006). The role of information security and corporate governance. Computers and Security , 54 (15), 447-485. Matt, B. (2003). Computer security: Art and science. New York: Pearson Education, Inc. Neumann, P. (2006). Computer-related risks. New York: Addison-Wesley. Orebaugh, A., Ramirez, G., & Beale, J. (2007). Wireshark & Ethereal Network Protocol Analyzer Toolkit. Syngress. Peltier, T. (2005). Information security policies, procedures, and standards: Guidelines for effective information security management. Boca Raton, Florida: Auerbach publications. Russell, D., & Gangemi, G. (2011). Computer security basics. Sebastopol, CA: O'Reilly and Associates. Salomon, K., & Cassat, P. (2003). Electronic information security: A legal perspective. New York: Lohnes and Albertson. Tan, C., & Ruighaver, A. (2005). A framework for investigating the development of security strategy context in organizations. Conference Proceedings of the 6th Australian Information Warfare and Security Conference: Protecting the Australian Homeland (pp. 216-226). Sydney: Deakin University. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Threats Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Cyber Threats Assignment Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1462640-y-week
(Cyber Threats Assignment Example | Topics and Well Written Essays - 1000 Words)
Cyber Threats Assignment Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1462640-y-week.
“Cyber Threats Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1462640-y-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Threats

Threats of the Future

The scope of these threats is also becoming more global, and surprisingly, more virtual or transparent, so that they are now very difficult to spot and equally difficult to defend against (Cyber Threats of the Future).... This essay "threats of the Future" discusses how the nature of the threats in the future would be very different from the ones we face today, and most will be linked to the technological advances of today.... The future threats and the defense against them would be, in the most likelihood, more technological and virtual than physical, and of a nature that few would have thought of or considered a serious threat....
9 Pages (2250 words) Essay

Primary Cyber Threats

This research ''Primary Cyber Threats'' has been conducted to explore the latest Cyber Threats an airport bears and all the issues in an airport's infrastructure which is equally valuable for the existing, new, and future clients and passengers.... In the security system against Cyber Threats, a company usually determines its target.... n the security system against Cyber Threats, a company usually determines its target and policies which includes the latest and more advanced persistent threat....
3 Pages (750 words) Coursework

Cybersecurity

This paper ''Cybersecurity'' discusses the methods of government intervention while dealing with Cyber Threats, especially with regard to the laws that the government has set up.... Moreover, the paper will discuss the methods of government intervention while dealing with Cyber Threats, especially with regard to the laws that the government has set up.... Through the use of this approach, Cyber Threats are reduced since the government will monitor the flow of information, as well as the messages exchanged via the internet (Theohary, 2010)....
6 Pages (1500 words) Literature review

Securing Jacket-X Corporations Network against Cyber Threats

The paper "Securing Jacket-X Corporations Network against Cyber Threats" states that Jacket-X can best ensure data security in stored devices by using data encryption.... Key areas to address to avert Cyber Threats are network security, protocol and services, user security, password security, and data storage security.... It is important for Jacket-X to implement ways of detecting and securing networks to counter Cyber Threats vulnerabilities such as email spoofing, denial of service attacks, malware intrusion, spyware, hackers as well as data and information theft that are implemented through the network (Roberta Bragg, 2004)....
5 Pages (1250 words) Coursework

Cyber Threats and Data Privacy by Birchfield

From the paper "Cyber Threats and Data Privacy by Birchfield" it is clear that the author provided detailed information concerning the internet and the role that the internet plays in the current economies.... The article "Cyber Threats and Data Privacy" by Birchfield simply provides information about the occurrences and the effects of cybercrime in the US and especially in New Zealand.... Cyber Threats and data privacy are factors that are currently becoming a major focus for various businesses, organizations, and governments around the world....
1 Pages (250 words) Article

Avoiding Cyber Threats in E-Commerce

The paper "Avoiding Cyber Threats in E-Commerce" provides a deep insight into measures available to prevent cyber-attacks - intrusion detection prevention systems, firewalls, encryption, anti-virus software, and login passwords, and programs for enhancing consumers' awareness of security.... Business organizations face millions of cyber attacks daily.... hesis statement: e-commerce is safe from cyber-attacks because it has sufficient mechanisms to defend critical attacks and respond to any cyber-attacks....
6 Pages (1500 words) Essay

Cyber Threats and the Effects of Insurance vs. other Risk Controls

The author of the paper 'Cyber Threats and the Effects of Insurance vs.... These being the most common threats, this paper thus seeks to define each component and break down the way each one can adversely affect the financial sheet at the end of the day (Cordesman, 2002).... Businesses should take cyber risk insurance covers to help cover for the loss and breach of data.... However, insurance policies should be checked, for instance, Property insurance policies and liability insurance policies Accordingly, awareness of cyber risks needs to be increased to bring this newfound interest in insurance products to a new level of concern....
5 Pages (1250 words) Research Paper

The Cyber Threats in Saint Louis County

The paper "The Cyber Threats in Saint Louis County" discusses that the development of information technology has been driving the world towards becoming more digitalization.... The digitalization of the world has led towards the emergence of the new and potential threat of cyber-war.... This provision must abandon the restrictive laws binding agencies involved in investigating cyber-crime so that they are able to carry out internet spying and are empowered to spy cybercrimes easily....
9 Pages (2250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us