Free Essay

Network Based Threat Research

In:

Submitted By mvitanovec
Words 810
Pages 4
Network Based Threat Research

CMGT/431
24 Aug 2015

Network Based Threat Research With advancements in the ever growing internet with more and more individuals becoming accustomed to using the web as a means of communicating the opportunity for outside sources to gain ones information is expanding daily. Recently the Department of Defense’s Joint Staff became the latest target in a spear phishing attack. For over two weeks more than 4,000 users on the Defense network have been shut down by this attack (Starr, 2015). Where are all these threats originating from? They are from every location on the universe within the United States, China, Russia and even our own allies (Starr, 2015).
Provide a description of a few network based threats The recent attack on the Department of Defense was a spear phishing attack. These are attacks through emails sent to employees with hopes that they open the link. Once the link is opened they give up their network credentials and it allows an outside source into a network. Denial-of-servie (DoS) and distributed-denial-of-service (DDoS) are attacks from one or more devices that are targeted at a server that creates so much traffic or demands for services that the target cannot respond to legitimate requests (TechTarget, 2000-2015).

Figure 1: In a DDoS attack, multiple devices (red) flood a server with requests, overwhelming the server and blocking legitimate users (green).
Malware or malicious software is any software that is used with intentions to disrupt computer operations, gather information or gain access to private computers (Norton, 1995).
For each threat, focus on describing how the threat exploits network vulnerabilities In the case of the Phishing attack on the Joint Staff, malicious emails are created that resemble legitimate emails with links. Those links are the key the attacker is hoping the end user opens. If opened full access is usually gained by the attacker. The end user usually doesn’t know what just happened by opening the link. Once inside the attached can move throughout the network with whatever rights the end user had. This can go on for days, months and even years without proper detection. DoS and DDoS are attacks that are geared to slowing or shutting down a network. This is accomplished by one or more devices being used to gain access to a network. With all the incoming traffic this creates the server cannot keep up with the demand and any true users are then kept out or slowed down from any access to the network. At worst case the server fails and goes off line. Malware or malicious code is software programs that infiltrate a computer, again without the end user knowing it had happened. Once installed on a system it is designed to steal personal information and send that back to the source. Malware comes in different forms of code including viruses, worms and Trojan horses and usually hidden within files, programs and websites to name a few.
Explain the controls that would counter these threats To mitigate these threats means to have whatever tools are available to stop these from occurring. Having a firewall with the proper antivirus software installed will stop, quarantined and notify the end user of any sure problem areas. This software runs in the background is always on the lookout for these threats (Rubens, 2013). Any key element to this is having the software always updated. Everyday hundreds of new threats are detected. For this reason threat catalogs are always updated. However, you can have all the best software and hardware available but human error is usually there the breakdown occurs. To combat this one needs to be vigilant about all these types of threats. One needs to know what to lookout for when opening emails that have attached files and links. For large companies, having an ongoing training program for network/security awareness is important to the success of the business.
Conclusion
It is vital importance that everyone has some type of virus protection installed on their personal, business and mobile computers. With everyone being on the internet, receiving emails and communicating with mobile devices they become a target for attacks. The means bringing in malicious programs is so much easier compared to twenty years ago.

References
Norton. (1995). Malware. Retrieved from Norton by Symantec: http://us.norton.com/security_response/malware.jsp
Rubens, P. (2013, March 25). 6 Emerging Security Threats, and How to Fight The. Retrieved from eSecurity Planet: http://www.esecurityplanet.com/network-security/6-emerging-security-threats-and-how-to-fight-them.html
Starr, B. (2015, Aug 7). Official: Russia suspected in Joint Chiefs email server intrusion. Retrieved from CNN Politics: http://www.cnn.com/2015/08/05/politics/joint-staff-email-hack-vulnerability/
TechTarget. (2000-2015). Network-based attacks. Retrieved from Search Security : http://searchsecurity.techtarget.com/feature/Network-based-attacks

Similar Documents

Premium Essay

Ndividual- Network Based Threat Research

...Individual: Network Based Threat Research There are so many people who are connected to network and with the passing time, the amount of people connected through network is increasing even more. As the network connectivity is increasing, the threats to security are also increasing. Network security and network-based threats are the most significant vulnerabilities that need to be maintained as it involves information, which is transferred between computers. There are several pieces of information, which is case sensitive and is vulnerable to outside attack. The network security is also exposed to hackers attack and is subject to various malicious threats that can endanger the sensitivity of information and pose a threat to network. The various network-based threats are pumped into the network all over the world and are a significant matter for consideration at the moment (Godbole, 2008). Network based threats There are various network-based threats some of which are explained below: * Viruses and Worms: Virus is a coded program or coded information that is transmitted or loaded into the computer unintentionally and run on the system. It exploits the system without the knowledge and wish of the system owner and can create huge damage and harm to the computer. Freezing or hanging of computer after opening a mail or coded information is an example of virus attack through network. The downloading of virus onto the computer system will affect the entire computer network because...

Words: 789 - Pages: 4

Free Essay

11.2.2.6 Lab Cnaa

...Lab – Researching Network Security Threats Objectives Part 1: Explore the SANS Website Navigate to the SANS website and identify resources. Part 2: Identify Recent Network Security Threats Identify several recent network security threats using the SANS site. Identify sites beyond SANS that provide network security threat information. Part 3: Detail a Specific Network Security Threat Select and detail a specific recent network threat. Present information to the class. Background / Scenario To defend a network against attacks, an administrator must identify external threats that pose a danger to the network. Security websites can be used to identify emerging threats and provide mitigation options for defending a network. One of the most popular and trusted sites for defending against computer and network security threats is SysAdmin, Audit, Network, Security (SANS). The SANS site provides multiple resources, including a list of the top 20 Critical Security Controls for Effective Cyber Defense and the weekly @Risk: The Consensus Security Alert newsletter. This newsletter details new network attacks and vulnerabilities. In this lab, you will navigate to and explore the SANS site, use the SANS site to identify recent network security threats, research other websites that identify threats, and research and present the details about a specific network attack. Required Resources Device with Internet access Presentation computer with PowerPoint or other presentation software...

Words: 593 - Pages: 3

Premium Essay

Cybercrime

...internet has become an important aspect through which education institutions use to carry out research, communicate and innovate. Even through this evolution has brought many benefits but also it has also brought serious threats such as cyber-attacks that has been demonstrated over the past few years through acts of cyber espionage and cyber-crime through the virtual space. In this context, the University of Dar es Salaam needs to develop policies towards cyber threats even through this has often be clustered and fragmented. Using theoretical and conceptual models this paper provides an informed understanding and critical assessment of the University of Dar es Salaam cyber security policy through addressing the following research questions: What are the IT risk management policy and systems that can be developed for the University of Dar es salaam? The primary data is collected through surveys, and interviews that are open ended and close ended. The results of the paper demonstrated that colleges and universities have been a target for cyber-attacks due to the fact that of the vast amount of computing power they possess, and they provide open access to their constituents and to the public. The research also showed that University of Dar es Salaam doesn’t have a comprehensive IT security risk management policy or guidelines that will guide the business process in the event of an IT security threat. Therefore the University needs to develop policiesthat provide roadmap for effectively...

Words: 7435 - Pages: 30

Premium Essay

Emerging Cybersecurity Strategies

...Abstract: Advanced cyberattacks on the public and private sectors at the local, national, and international level have prompted an increase in funding and support for the study of emerging cybersecurity technologies. The considerations for this paper are to discuss the emerging technologies and strategies that can be integrated across the public and private sector to improve cybersecurity on a local, national, and international level. New technologies need to dynamically assess networks real-time such as with the use of Remote Agents and Real-time forensic analysis. These technologies also need to make the attack space less predictable and constantly evolving such as through the use of moving target defense. Emerging Cybersecurity Technologies The E-government Act of 2000 was signed by President Bush to move toward a more 24-7 government. The dream was to eliminate the need to have to stand in line at the DMV for half a day just to pay annual vehicle registration fees (Barker, 2011). Security was certainly a concern, but it was not at the forefront of the move as government agencies would go through massive changes in equipment, manning, and practices in order to move information and programs online. Now, over a decade later we still see moves and changes taking place, such as the department of Veterans Affairs recently moving all of their applications, forms and records online. The expensive cost of getting the government caught up was expected with such an overhaul...

Words: 2624 - Pages: 11

Free Essay

Security in the Smart Grid

...Security in the Smart Grid introduction Present and future battlefronts of electronic terrorism includes the state of readiness and resilience of the computer equipment protecting America's energy distribution networks and industrial control systems. According to a Pike research report [1] published March 1st of this year, it is projected that investments in smart grid cyber security will total $14 billion through 2018. First, what is a power grid? A power grid consists of several networks that carry electricity from the power plants where it is generated to consumers, and includes wires, substations, transformers, switches, software, and other hardware. The grid in the past used a centralized one-way communication distribution concept that consisted of limited automation, limited situational awareness, and did not provide the capability for consumers to manage their energy use. “Smart Grid” generally refers to a class of technology designed to upgrade the current utility grid infrastructure to improve the efficiency on the power network and in energy users’ homes and businesses. Much of the legacy power plant infrastructure is now over 30 years old with electrical transmission and distribution system components (i.e. power transformers) averaging over 40 years old and 70% of transmission lines being 25 years or older [2]. In December 2007, Title XIII of the Energy Independence and Security Act of 2007 became an official...

Words: 3081 - Pages: 13

Premium Essay

Next Generation Firewall

...____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in a controlled system, is the act or action of an attack. There are many types of threats. These threats can be categorized and examples of these threats are given alongside of them. For example, sabotage or vandalism is the destruction of systems or information. According to research, Internet usage worldwide has exponentially grown in a ten year study. Results of the study revealed...

Words: 3381 - Pages: 14

Free Essay

Proj Mgmt

...GIAC Enterprises Security Controls Implementation Plan Group Discussion and Written Project John Hally, Erik Couture 08/07/2011 GIAC Enterprises – Security Controls Implementation Plan Table of Contents Executive Summary Introduction Security Controls Implementation Plan Incident Response Weekend Plan Conclusions References 3 3 4 6 9 9 2 GIAC Enterprises – Security Controls Implementation Plan Executive Summary The cyber-threat landscape has evolved significantly in recent years. From primarily a threat of denial of service and website vandalism in years past, to the currently advanced and well resourced adversaries employing complex technologies to achieve financial and political benefit. At GIAC Enterprises, we have observed huge increases in suspicious network activity directed at our corporate networks, sometimes even targeting key individuals. Due to the huge global increase in demand for fortune cookie messages, it is reasonable to expect that this undesired attention will only increase in the coming months and years as cyber-criminals and possibly corporate spies attempt to closely monitor our business activities and steal vital business information. This paper presents the recommendations of the tiger team, which was recently formed, with the goals of: 1. Developing a strategy for the implementation of the SANS Top 20 Security Controls, and in particular the creation of an incident response capability; and 2. Identifying and eradicating any possible...

Words: 3167 - Pages: 13

Free Essay

E-Harmony

...interests with. Online dating allows singles to search for a mate twenty four hours a day, seven days a week which works perfectly for a busy professional. Secondly, online sites like eHarmony provide matchmaking tools that can suggest single who are compatible with your values and beliefs, these tools make finding a potential mate easier than if you were randomly trying to meet someone in the real world. Lastly, it allows the singles to build a rapport before dating someone thus reducing the awkwardness of a first date. All of these factors play a role in eHarmony business strategy to differentiate the company from its competitors. This report examines online dating industry and assesses eHarmony’s current strategic position, potential threats and opportunities for competitive advantage and the recommendation for the future growth. Position Statement The online personals/dating industry is growing at an unprecedented rate and providing significant economic returns for its incumbents. Among these...

Words: 1632 - Pages: 7

Free Essay

Deploying Application Firewall in Defense in Depth Principle

...practitioners have recommended a layered approach called defense-in-depth. The cost and complexity of deploying multiple security technologies has prevented many organizations from achieving their information security goal. In view of these constraints and in compliance with recent with recent corporate and industry regulations like Sarbanes-Oxley Act and Payment Card Industry Data Security Standard, businesses now deploy application firewalls as security measures. Based on the foregoing, the author has recommended the use of application firewalls as a single platform for achieving layered security through network protection, application protection and data protection. This paper commences by examining the defense in depth theory and the types of application firewall and the author concludes by citing the Institute for Computing Applications (IAC) of the Italian National Research Council (CNR) as an example of an organization which engaged application firewalls in resolving its network security problem. Research Analysis/ Body The development of Information security is of paramount importance to organizations that have online presence. The primary goals of information security are confidentiality, integrity and availability. In order to achieve these goals, organizations need to adopt a multi-layered security defense strategy named defense in depth. A defense-in-depth approach to security suggests an organization shouldn't rely on a single device to protect its system...

Words: 1701 - Pages: 7

Premium Essay

Integrative Network Design

...Integrative Network Design NTC 362 Integrative Network Design This project will consist of five different phases totaling a timeline of six months. The first month will be the planning phase. This phase will have a deadline no longer than 30 days. After the first 30 days, the second phase will take into effect, which is the installation phase. This phase will also have a timeline of no more than 30 days. The Third Phase will be the longest phase of a timeline of 60 days. The third phase will be the testing phase. The testing phase is important because this is the troubleshooting phase. Troubleshooting is important to ensuring the new system is running up to optimal standards. The fourth phase will have a deadline of 30 days. The fourth phase is the Training Phase, and our trainers only need a month to convert the needed employees to the new system. The Fifth and Final Stage is our Final Evaluation/Lessons Learned Stage. At this point, the system is at full running operation, and for the last month the system will be ready for a full evaluation. Riordan Manufacturing is a fast growing business, and has grown into a large fortune 1000 company. As they grew into this large company they have been encountering problems with lost or misplaced material. As of now Riordan’s material is manually tracked by paper and pen by employees then entered into a database by an inventory clerk at the end of the day. This is causing them to misplace customer packages resulting in unhappy...

Words: 2910 - Pages: 12

Premium Essay

Riordan Manufacturing Internet Security Issues and Web Concerns

...Riordan Manufacturing Internet security issues and web concerns The biggest, and probably the most insidious threat facing Riordan comes not from aging servers, poor physical security, or antiquated workstations, but from their own employees; many of which may become unwitting pawns of social engineering, phishing, and malware. In recent surveys conducted across the industry, “More than 50% of businesses consider their own employees to be the greatest IT security threat, with 54% of respondents believe that insiders are the biggest threat, compared to 27% who fear criminals the most, 12% state-sponsored cyber-attacks and 8% competitors (Swabey, 2013).” With a growing trend across the industry, to include even the Department of Defense, to allow employees access to social media sites like Facebook, Twitter and LinkedIn, this comes as no small wonder. “Don't be too proud of this technological terror you've constructed (Lucas, 1976).” On the surface, all four of Riordan’s plants have firewalls at the border of their network, and to many novice system administrators and misguided information technology specialists this should be more than enough to secure the network from internet based attacks. Chances are these firewalls are inadequately configured; explicit deny means nothing if your letting social media sites into your internal network. “Social networks are about connecting people, and a convincing-looking profile of a person followed by a friend or connection request can...

Words: 921 - Pages: 4

Premium Essay

Hisrory of Internet

...that led to the Internet, most communication networks were limited by their nature to only allow communications between the stations on the network, and the prevalent computer networking method was based on the central mainframe method. In the 1960s, computer researchers, Levi C. Finch and Robert W. Taylor pioneered calls for a joined-up global network to address interoperability problems. Concurrently, several research programs began to research principles of networking between separate physical networks, and this led to the development of Packet switching. These included Donald Davies (NPL), Paul Baran (RAND Corporation), and Leonard Kleinrock's MIT and UCLA research programs. This led to the development of several packet switched networking solutions in the late 1960s and 1970s, including ARPANET and X.25. Additionally, public access and hobbyist networking systems grew in popularity, including UUCP and FidoNet. They were however still disjointed separate networks, served only by limited gateways between networks. This led to the application of packet switching to develop a protocol for inter-networking, where multiple different networks could be joined together into a super-framework of networks. By defining a simple common network system, the Internet protocol suite, the concept of the network could be separated from its physical implementation. This spread of inter-network began to form into the idea of a global inter-network that would be called 'The Internet', and this...

Words: 1333 - Pages: 6

Premium Essay

Threats to Computer Networks

...TABLE OF CONTENT Introduction 2 Threats 2 • State-sponsored espionage and sabotage of computer networks 2 • Monster DDoS attacks 2 • The loss of visibility and control created by IT consumerization and the cloud 2 • The password debacle 3 • The insider threat 3 UAE CASE 3 Precaution 4 Conclusion 4 Bibliography 5   Introduction As the requirement of the paper I will explain the types of fraud may face by the organisation computer networks. Along with I will discuss two cases of such fraud in UAE and finally I will discuss possible precautions to mitigate the risk of such frauds. In recent year the computer network threats become technically more advanced, sophisticated, more organised and at the same time difficult to detect. It is important to mention that these attacks not only damage network security for financial frauds but this also aim to disable and reliability of the infrastructure as well, which may cause worse type of threat to the national security. (Tom Cross and Eric Savitz, Forbes Staff, 2012) Threats Most respected financial magazine FORBES has mentioned five main security threats to the computer networks which includes. • State-sponsored espionage and sabotage of computer networks o In 2012 a very famous virus called Flame was discovered which was not traced by the software in years. Similarly virus named Shamon destroyed the data of oil and energy companies and made the machines unbootable. • Monster DDoS attacks o DDos stands for the...

Words: 1014 - Pages: 5

Premium Essay

Directions for Web and E-Commerce Application Security

...applications are discussed. These security measures must be implemented so that they do not inhibit or dissuade the intended e-commerce operation. This paper will discuss pertinent network and computer security issues and will present some of the threats to e-commerce and customer privacy. These threats originate from both hackers as well as the e-commerce site itself. Another threat may originate at ostensibly friendly companies such as DoubleClick, MemberWorks and similar firms that collect customer information and route it to other firms. Much of this transaction information is able to be associated with a specific person making these seemingly friendly actions potential threats to consumer privacy. Many of the issues and countermeasure discussed here come from experiences derived with consulting with clients on how to maintain secure e-commerce facilities. These methods and techniques can be useful in a variety of client and server environments, also serving to alert e-commerce users of potential threats. 1. Introduction For the effective operation of the web and e-commerce applications, security is a key issue. The security threats include access control violations, integrity violations, sabotage, fraud, privacy violations, as well as denial of service and infrastructure attacks. All of these threats collectively...

Words: 3283 - Pages: 14

Free Essay

Pldt

...Philippines. Through the Company’s three principal business segments, wireless, fixed line and BPO, the Company offers the diversified range of telecommunications services across the Philippines’ fiber optic backbone and wireless, fixed line and satellite networks. The Company provides cellular and wireless broadband, satellite and other services through its wireless business. The Company is the provider of fixed line telecommunications services, servicing retail, corporate and small medium enterprise (SME), clients. On December 4, 2012, the Company sold its BPO segment. The Company’s cellular business, which it provides through Smart and DMPI to almost 70 million subscribers as at December 31, 2012, approximately 97% of whom are prepaid subscribers, focuses on providing wireless voice communications and wireless data communications, primarily through text messaging, but also through a variety of VAS, and mobile broadband. Smart markets nationwide cellular communications services under the brand names Smart Prepaid, Talk ‘N Text, Smart Postpaid and Smart Infinity. Smart Prepaid and Talk ‘N Text are prepaid services while Smart Postpaid and Smart Infinity are postpaid services, which are all provided through Smart’s digital network. A cellular voice service consists of all voice traffic and voice VAS, such as voice mail and international roaming. Smart Unli Data Plan offers unlimited Internet browsing on postpaid basis, best suited for subscribers with high data usage. Through...

Words: 6745 - Pages: 27