Different kinds of attacks such are phishing-crypto-jacking

Assignment Help Science
Reference no: EM132351626

1. Fruhlinger (2018) posted about the Wannacry ransomware attack of May 2017. This was, in the opinion of many experts, a warning attack. If the hackers had not left a 'kill-switch' within the code of the ransomware the attack could have been worse and impossible to stop. The Windows application that this attack took advantage of was the SMB protocol which allows communication between computers in a network. The vulnerability in the SMB protocol had been discovered by the NSA who had, instead of reporting it, used it to create the EternalBlue exploit. This exploit was released to the public and has been used since for many different types of attacks (Schirmarcher, Ondrus & Tan, 2018).

This was a security misconfiguration vulnerability in the OWASP top ten. This is because the SMB protocol could have been secured if only network admins around the world had bothered to install the patch that had already been released by Microsoft. The availability and confidentiality components of the CIA triad were affected by this ransomware attack.

After the attack there has been a lot of talk as to the future of cybersecurity and how easy it is for exploits such as these to spread globally. Once more it seems that the industry is far behind the attackers when it comes to anticipating exploits. This is especially made worse by the fact that there is negligence by corporations e.g. some corporations still use Windows XP.

Answer:

I want 250 words explanation on above paragraph with 3 reference, your sentence must be start from, I like your post, I would like to add some more details on your discussion....

2. Application vulnerabilities are increasing in today's world by different kinds of attacks such are phishing, crypto-jacking, Service attacks etc. This kind of vulnerabilities can occur in different places like user personal computers, client machines or within the end-user workstations. In order to avoid these kinds of vulnerabilities companies must take precautions in discovering and preventing the attacks.

There are several kinds of vulnerabilities are occurred in the Microsoft. Such is, an elevation privilege vulnerability have occurred .net framework which could give access to an unauthorized person or an intruder at an elevated level. With this elevated privilege vulnerability, an entire organization would be in danger as this could give access to whole data or files in the organization. The Broken access control, insecure deserialization will be applicable to this kind of vulnerability. All there CIA components will come into the picture. The insecure deserialization can be detected through the application security tools where a broken access control needs to do testing through the testing tools and also penetration testing will be helpful in identifying the non-functional access controls.

There was a problem associated with Microsoft excel which is an information disclosure vulnerability. Authentication is not required to exploit this vulnerability and coming to the CIA triad it is impacting the confidentiality component. We can protect this kind of vulnerability through testing before launching into the real world.

Answer:

I want 250 words explanation on above paragraph with 3 reference, your sentence must be start from, I like your post, I would like to add some more details on your discussion....

Reference no: EM132351626

Questions Cloud

What effect human resources processes have on patient care : Arrange interview with the head of human resources at local health care organization. Examine what effect their human resources processes have on patient care
What is the place of deuteronomy within story of the bible : What is the place of Deuteronomy within the story of the Bible? What purpose did it serve to the ancient Israelites? What purpose does it serve today?
Financial information is used in health care organizations : Analyze the ways financial information is used in health care organizations. discuss consolidated financial statements and how these are used.
Health care management in addressing this pressing dilemma : Describes the roles and responsibilities of health care management in addressing this pressing dilemma. What are the major financial issues being faced?
Different kinds of attacks such are phishing-crypto-jacking : Application vulnerabilities are increasing in today's world by different kinds of attacks such are phishing, crypto-jacking, Service attacks etc.
Cohort study design and case-control study design : Identify a journal article related to obesity. What are the major differences between the cohort study design and the case-control study design?
Proposing for your new or improved health care service : Select 3 processes from the following list that are relevant to the facility you are proposing for your new or improved health care service:
Scenarios for the future of cybercrime : Which of the questions posed in section 2 (beginning on page 3) of "Project 2020 Scenarios for the Future of Cybercrime - White Paper for Decision Makers"
Abortion-euthanasia-animal experimentation-legal punishment : Discuss the permissible use of violence for any one of the following moral issues you choose: abortion, euthanasia, animal experimentation, legal punishment,

Reviews

Write a Review

Science Questions & Answers

  Journal of pharmaceutical sciences

This journal is a scientific publication of Indian Pharmaceutical Association and highlights various bright points of it.

  Optical fibres

This document discuss about the main attributes and characteristics of optical fibres.

  Micro organisms

This project report reveals the fact and proves a specific objective mentioned to be studied upon.

  Describing histology of an organ

The discussion of the technique should include a literature review on the evolution of the technique.

  Interpret the sensitivity of mammography

Calculate and interpret the sensitivity of mammography. Diagnostic test with Sensitivity 50%, Specificity 50% and prevalence 50%. Crude mortality rate. Damage caused by motor vehicle accidents.

  Discuss the role that science plays in your daily life

Role that science plays in your daily life and Integrity, Intensity, Innovation, and involvement in scientific field

  Prepare a flexible budget gator divers

Prepare a Flexible Budget Gator Divers is a company that provides diving services such as underwater ship repairs to clients in the Tampa Bay area.

  Neurological disorders

Designing a neuroprosthesis for the neurological disorders

  Complexity of cell surfaces

Lipid rafts provide another example of the complexity of cell surfaces in both their structural character and biologic functionality. Please explain the nature of these structures and their functionality.

  Exploratory activity on bird beaks

Describe how natural selection and evolution are demonstrated by this activity

  Spatial and temporal variation of heat content in the upper

In this study the temporal and spatial variation of heat content in the upper 70m layer of the Arabian Sea was for a period of 1991 to 2008 have been attempted.

  Earthquake databases

Earthquake Databases

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd