CMGT441: Introduction to Information Systems Security

Overview of fundamental principles in information security.

Mason Carter
Contributor
4.6
48
10 months ago
Preview (4 of 11 Pages)
100%
Log in to unlock

Page 1

CMGT441: Introduction to Information Systems Security - Page 1 preview image

Loading page ...

Attack Prevention1Attack Prevention:Preventing Cyber AttacksJon BartholfCMGT441:Introduction to Information Systems SecurityJanuary 17, 2011Bashar ElkhatibAnalyze the process of a cyber attack as described in the article, outlining the steps involved and the potentialconsequences. Based on the prevention techniques mentioned, assess which methods are most effective in defendingagainst cyber attacks, particularly for home users and small businesses. Your response should be approximately600-800 words.

Page 2

CMGT441: Introduction to Information Systems Security - Page 2 preview image

Loading page ...

Page 3

CMGT441: Introduction to Information Systems Security - Page 3 preview image

Loading page ...

Attack Prevention2TABLE OF CONTENTSINTRODUCTION.....................................................................................................................3CYBER ATTACK: WHAT IT IS............................................................................................3STEPS OF A CYBER ATTACK..............................................................................................4Placement of Malware on Trusted Website...........................................................................4Client-Side Exploitation.........................................................................................................4Reverse Backdoor..................................................................................................................4Hash Dumping.......................................................................................................................5Pass-the-Hack Attack to Pivot...............................................................................................5Compromise of Domain Controller.......................................................................................5Exfiltration.............................................................................................................................5PREVENTION TECHNIQUES...............................................................................................5Risk Assessment and Identity of Weaknesses.........................................................................6Back-up of Vital Information.................................................................................................6Anti-Virus Software and Firewalls........................................................................................6Account Activity Monitoring..................................................................................................7CONCLUSION..........................................................................................................................7APPENDIXES...........................................................................................................................8Appendix A: Cyber Attack Steps 1 through 3 (Figure 1).......................................................8Appendix B: Cyber Attack Steps 4 through 6 (Figure 2).......................................................9Appendix C: SWOT Analysis Example (Figure 3).................................................................10REFERENCES..........................................................................................................................11

Page 4

CMGT441: Introduction to Information Systems Security - Page 4 preview image

Loading page ...

Attack Prevention3Attack Prevention: Preventing Cyber AttacksTechnology is everywhere, which is evident intheeveryday productsthat we as a society usesuch as computers, cell phones, global positioning devices, and the Internet. As technologyexpands and grows, so does the reliance and dependence on these types of products. But relianceand dependenceare not the only things thattechnology brings.Cyber attacks are a graduallyincreasing occurrence that is derived from technology; however, stoppingthese types of attacksbeforetheyoccur isusually more difficult than can be expected, but is overall not impossible.The trick to avertingsuchan attackliesin the programs and applications that one uses fordefense that recognizes, detectsand notifiesthe userthat an attack is imminent. This can besomething as simple as a malware and/or virus program to something more complex such asafirewall.The purpose of this paper is to discusswhat constitutes a cyber attack,examinethesteps involved in a cyber attack, anddeterminehow to prevent them, which was discussed in thearticle by Tony M. Damico entitledCyber Attack Prevention for the Home User: How to Preventa Cyber Attack (2009)and other sources.Cyber Attack: What It IsA cyber attack, also known as Cyber Warfare, is “an attempt to undermine or compromise thefunction of a computer-based system, oranattempt to track the online movements of individualswithout their permission” (WiseGeek, 2011).To put it in simpler terms, a cyber attack is thetargeting of something electronic to make them malfunction so that some type of reward can becollected.As mentioned in thefirstdefinition, cyber attacks fall into two basic categories: thoseacts that are intended to collect information and those that are intended to do harm. Cyber attacksthat are specifically carried out for the sole purpose of information gatheringrange from trackingthe movements that a user makes to copying important documents contained upon a hard drive,
Preview Mode

This document has 11 pages. Sign in to access the full document!