Chat with us, powered by LiveChat Phase 2 is to identify Solutions three (3) types of threat to a Secure System. Read the article on: Computer aided threat identification, http://citeseerx.ist.psu.edu/ - EssayAbode

Phase 2 is to identify Solutions three (3) types of threat to a Secure System. Read the article on: Computer aided threat identification, http://citeseerx.ist.psu.edu/

Phase 2 is to identify Solutions three (3) types of threat to a Secure System.

  1. Read the article on: Computer aided threat identification, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.712.3765
  2. Identify the three (3) major solution to a secure systems’ threats.
  3. Present your finding in a 400-words document.
  4. You must apply and use the basic citation styles of APA.
  5. Use in-text citation and list the reference of your supporting source following APA's style and formatting.

Running head: Security systems 1

Security systems 4

Security systems

Student’s name

Name of institution

Date

Types of threat to a secure system

Cyber-security is very important to systems. It helps to protect the organization’s data and keep it safe from hackers. However, in some cases, there occur some threats which might threaten the security systems. These threats are not good and can lead to damage or massive losses in the organization. The following three threats will be discussed; malware, denial of service and phishing.

Malware

Malware can be simply defined as malicious software such as worms, spyware, viruses and ransom ware. Malware is often activated when an individual clicks on a malicious attachment or link. These links or attachments lead to installing of unwanted and dangerous software (Gupta, 2020). Research explains that malware once activated can lead to the following; installation of additional dangerous software, blockage of access of important network components, disruption of individual parts making the system difficult to operate and also covertly getting information by transmitting data from the hard drive. In most cases, malware comes from social engineering. Social engineering is a situation where an individual wants to give away his or her personal information. Another source of malware is emails and fake downloads.

Denial of Service

Denial of service can be simply explained as a type of cyber-attack that floods a network or a computer which later makes it impossible to respond to requests. A distributed denial of service does the same thing but in this case the attack comes from the computer network. Cyber hackers often employ a flood attack to derange the handshake procedure and carry out denial of service (Haque, 2021). Other techniques may be employed as well to carry out denial of service and in most cases cyber hackers use the time that a network is damaged to launch other attacks. This is a serious threat to a secure system which needs to be addressed.

Phishing

In simple terms, phishing is defined as any effort to fraudulently solicit personal data from a person or a company. In other cases phishing can be any effort to deliver malicious software, by pretending to be a trustworthy organization or business entity (Basit, 2021). In short, phishing uses fake communication such as invoices or emails to trick the receiver into opening it and doing the operations inside such as giving out a credit card number. It is important to note that the main goal of phishing is to steal sensitive data like log in information or credit card or to install malware on the individual’s machine.

References

Basit, A., Zafar, M., Liu, X., Javed, A. R., Jalil, Z., & Kifayat, K. (2021). A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommunication Systems76(1), 139-154.

Gupta, R., Tanwar, S., Tyagi, S., & Kumar, N. (2020). Machine learning models for secure data analytics: A taxonomy and threat model. Computer Communications153, 406-440.

Haque, M., & Krishnan, R. (2021). Toward automated cyber defense with secure sharing of structured cyber threat intelligence. Information Systems Frontiers23(4), 883-896.

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing