identifies and describes many different types of malicious attacks, computer science homework help
Assignment - Social EngineeringChapter 3 of the text (pp. 101-102) identifies and describes many different types of malicious attacks. Select three from the list and, using this reading and at least one additional outside source, write a 2-3 page APA-formatted paper (including cover page, running head, page numbers, APA headers, in-text citations and final Reference page) analyzing how these types of attacks are made, and how they can be combatted.page 101 - 102 as following informationWhat Is a Malicious Attack? An attack on a computer system or network asset succeeds by exploiting a vulnerabilityin the system. There are four general categories of attacks. An attack can consist of allor a combination of these four categories: • Fabrications—Fabrications involve the creation of some deception in orderto trick unsuspecting users. • Interceptions—An interception involves eavesdropping on transmissionsand redirecting them for unauthorized use. • Interruptions—An interruption causes a break in a communication channel,which blocks the transmission of data. • Modifications—A modification is the alteration of data contained intransmissions or files. As you learned earlier, security threats can be active or passive. Both types can havenegative repercussions for an IT infrastructure. An active attack involves a modificationof the data stream or attempts to gain unauthorized access to computer and networkingsystems. An active attack is a physical intrusion. In a passive attack, the attacker doesnot make changes to the system. This type of attack just eavesdrops on and monitorstransmissions. Active threats include the following: • Brute-force attacks • Dictionary threats • Address spoofing • Hijacking • Replay attacks • Man-in-the-middle attacks • Masquerading • Social engineering • Phishing • Phreaking • Pharming Such attacks are widespread and common. A growing number of them appear onan information systems security professional’s radar screen every year. Followingis a description of several of the most common types of malicious attacks.
THIS QUESTION IS UNSOLVED!
Request a custom answer for this question