StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

CyberSecuirty Threats - Essay Example

Cite this document
Summary
Among them is piggy backing. In the physical environment, piggybacking is achieved when an intruder gains access by using the access of authorized personnel (Peter & Allan, 180). When an individual arrives and opens an…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
CyberSecuirty Threats
Read Text Preview

Extract of sample "CyberSecuirty Threats"

Physical Security Physical security is achieved by means of various ideas. Among them is piggy backing. In the physical environment, piggybacking is achieved when an intruder gains access by using the access of authorized personnel (Peter & Allan, 180). When an individual arrives and opens an electronically or mechanically closed door using a computer like gadget, the intruder follows in as the person gains access through the door. In the computer world, this applies to terminals. A terminal may be accessed via a password (Lynch, 391).

Now the intruder has to gain access through the individual’s password and this he or she does by compromising the computer. This compromise may include a covert computer terminal is connected to the same line through the telephone switching equipment and is then used when the legitimate user is not using the terminal. The computer cannot differentiate between the two terminals; it senses only one terminal and one authorized user (Peter & Allan, 20).A user may also improperly sign off when leaving a terminal session.

Here, the intruder will find the terminal session in active state and access the user’s files as the computer believes the user is still active. The perpetrator may also use another form of piggybacking where they forward the call of the victim’s calls to the perpetrator’s phone (Peter & Allan, 120).Passwords are the other form of security verification methods implemented in computer networks and devices. With passwords, the user is required to enter secret digits or letters or both to provide access to a system or files in a system (Lynch, 401).

Passwords have been in existence since long ago and are applicable in many fields such as in automated teller machines, mobile phones and computer operating systems (Peter & Allan, 70). However, passwords have been known to be cracked and as such very in strength where alphanumeric patterns of passwords offer the strongest passwords while simple letters or digits offer weak and vulnerable passwords (Peter & Allan, 80).Phishing in internet security is a form of crime that occurs in the internet.

Here, deception is used to acquire someone’s or a company’s sensitive information such as their bank account details, credit card number, usernames and passwords. The culprit masquerades as a trustworthy party such as a bank or popular site (Lynch, 410). They in turn send emails or instant messages that are infected with malware and harm the unsuspecting victim. Once the message or email is opened the malware retrieves the user’s important and confidential information and sends it to the fraudster (Engin & Christopher, 554).

Social engineering involves psychologically manipulating people into releasing their confidential information. The various forms of social engineering include pretexting, diversion theft, phishing, tailgating, piggybacking, baiting and quid pro quo (Peter & Allan, 160). Diversion theft is carried out by professional thieves and is a con that mainly affects transport or courier companies. Here, the legitimate persons responsible for delivery of a certain consignment are requested elsewhere by the malicious persons (Engin & Christopher, 560).

Baiting is whereby an attacker schemes and leaves a malware-infected USB flash drive, CD-ROM or floppy disk in a very open area or sure location where the target persons may easily find it (Peter & Allan, 200). References Lynch, Jennifer. Identity Theft in Cyberspace: Crime Control Methods and Their Effectiveness in Combating Phishing Attacks. United States, 2005. Web.Engin, Kirda. Christopher Kruegel. Protecting Users against Phishing Attacks. Technical University of Vienna Vienna: Austria, 2005. Web. HUANG, Hua-jun.

WANG, Yao-jun. JIANG, Li-qing. Countermeasures: Technology of Phishing. College of Computer and Information Engineering, Central South University of Forestry & Technology, Changsha Hunan 410004: China, 2012. Web. Guillot, Grant J. Trespassing through Cyberspace: Should Wireless Piggybacking Constitute a Crime or Tort under Louisiana Law. Louisiana, 2008-2009. Web.Peter W. Singer, Allan, Friedman. Cybersecurity: What Everyone Needs to Know. Oxford University Press: United Kingdom, 2014. Print.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CyberSecuirty Threats Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
CyberSecuirty Threats Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1639111-cybersecuirty-threats
(CyberSecuirty Threats Essay Example | Topics and Well Written Essays - 500 Words)
CyberSecuirty Threats Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1639111-cybersecuirty-threats.
“CyberSecuirty Threats Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1639111-cybersecuirty-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF CyberSecuirty Threats

Problem of Cyber Security

The traditional way of ensuring cyber security has been to dedicate most of the effort and resources on the most crucial system components in attempts to keep in check the biggest known threats while partly neglecting some less important system components.... As many people become more dependent on modern technology, there has equally been an emergence of vulnerability to cyber attack such as security breaches, spear phishing and social media fraud....
1 Pages (250 words) Essay

Network Security Fundamentals

Many of credit card transactions need verification by the users to reduce high crime rate thus with the case of the medium ed start-up company, the Chief Information Security Officer (CISO) should be well equipped to handle a myriad of challenges and security threats posed by using online transactions.... Companies like American Express, Visa, Discover, JCB, and MasterCard among others have experienced information security threats thus the new company should employ mechanisms that should protect information from both internal and external threats....
5 Pages (1250 words) Essay

Continuity of Operations Planning

BCM is a framework that has been set up in order to identify both internal and external threats to an organization.... BCM also looks at the potential impacts that these threats may present to an organization.... With more and more people now using the internet, cyber security threat has become alive and the issue can no longer be overlooked....
1 Pages (250 words) Essay

Proposing a Solution

is at a heightened level of cyber threats considering the milestones it has made in the telecommunications and technological fields.... At the helm of the escalating risks to the national security in the country, the cyber environment threats are equally evolving, as...
6 Pages (1500 words) Essay

Department of Homeland Security Issues

In the modern world, Cybersecurity threats have become a major concern.... Department of homeland security (DHS) and its activities.... One central role played by these technologies in the DHS is information sharing and communication.... The DHS has many departments, including U....
1 Pages (250 words) Essay

Cyber Threat Analysis Services

The issues of cyber threats have been very serious and grievous as the risks involved have exposed secrete information of particular organizations to unauthenticated individuals.... Government agencies have also faced the forsaken effects of cyber threats as witnessed with exposure of critical government information to unwarranted individuals.... The graveness of cyber threats in the contemporary global world necessitated technologists and scientists to research ways by which information systems can be secured from detrimental attackers....
6 Pages (1500 words) Coursework

The Impact of Mobile Devices on Cyber Security

The level of technological growth in the past decade has been unprecedented, and the security threats… Statistics have shown that 91% of the American adults at least own a mobile gadget, while 55% of this population is using advanced gadgets such as tablets and Smartphone (Mobile Technology Fact Sheet, 2014).... The level of technological growth in the past decade has been unprecedented, and the security threats currently experienced have come as a threat to many....
3 Pages (750 words) Essay

Contemporary Organization Evaluation - The Cyber Threat Landscape

This essay "Contemporary Organization Evaluation - The Cyber Threat Landscape" discusses the business scene that has undergone a transformation because of technological innovations.... The innovations have impacted the business positively making the technologies to be continual and increase competition....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us