Cis 333

Submitted by: Submitted by

Views: 446

Words: 1267

Pages: 6

Category: Science and Technology

Date Submitted: 11/11/2012 02:06 PM

Report This Essay

Running Head: Video Development Company

Video Development Company

Kalani Galloway

Professor O’Connel

Strayer University, CIS 333 – Network Security Fund

Malicious Attacks

When identifying potential malicious attacks, threats, and vulnerabilities specific to this organization. It has been determined that our computer system or network asset has been exploited by vulnerabilities in the system. The attacks that concern me are Fabrications, Interceptions, Interruptions, and Modifications. Fabrication of official sites our organization frequents has been used to deceive several of our unsuspecting users. An advanced form of an interception device has been detected in which I believe has been used within the past 30 days during our teleconference to eavesdrop and transmit conversations regarding proprietary company issues.

The reason being is there have been several breaks in the communication channel that has blocked our transmission during data transfer. Modifications have also been detected in our systems file transmission which also leads me to believe that data has been altered. The potential impact of Brute –force attacks, Dictionary threats, Address spoofing, Hijacking, Replay attacks, Man-in-the-middle attacks, Masquerading, Social engineering, Phishing, Phreaking, and Pharming are many of the active threats that can have significant repercussions in our IT infrastructure. Some potential threats the organization must be concerned with are Denial or destruction threats. These threats make assets or resources unavailable or unusable.

Many organizations are potential victims of DoS attacks, and I do not want our organization to become Alteration Threats violates information integrity, and compromises a system by making unauthorized changes to data on a system intentionally or unintentionally. This change might occur while our data is stored on a network resource or while it is moving between two sources. I’ve also analyzed Disclosure Threats to...