Discuss about the various attacks and scams

Assignment Help Computer Network Security
Reference no: EM132216229

Discussion: In this age of information technology, data protection has become a critical component and a priority for the companies. Advancements such as cloud computing and machine learning helped in the diversification of data. As a result, private data became for vulnerable to various attacks and scams. The above where employees are sent strange emails to extract personal information is called phishing. Although phishing are more common in the finance industry, IT sector is also prone to these attacks. Complex phishing schemes can involve a long game, with hackers using fake social media profiles, emails and more to build up a rapport with the victim over months or even years in cases where specific individuals are targeted for specific data which they would only ever hand over to people they trusted. To solve the above situation, the first thing that should be done is to identify the source of these emails. It can be a case of spear phishing where specific individuals or groups are targeted. So, identification of the source with the help of skilled individuals can help in solving the current problem.

Once the current problem is solved, the company has to develop long term strategies to fight against these complex phishing schemes. Educating the employees about these emails and educating them in a simpler way can be starting step. For example in Microsoft, they have a tool where you can send out phish emails to your own organization to help train them on what phishing might look like, about how targeted it may be and to help understand who might need additional help in understanding how important it is to vet what you click on, and to only click on trusted emails and to only open up things that are trusted. A similar mechanism can be implemented with in the company. Using technology can be the next step where technology is used to block out as much as possible of those malicious emails. Apart from this, the company should develop various cyber strategies such as recruitment of high-skilled IT employees,cyber security behavior analytics, proactive monitoring and auditing capabilities. Companies with a fully implemented cyber strategy are better staffed and prepared for cyber attacks so given the above nature of attack the company should work on developing a fully functional cyber defense strategy to protect themselves from future attacks.

Reference no: EM132216229

Questions Cloud

Amount of raw materials available for the production line : A portion of a manufacturing facility desires to only have a limited amount of raw materials available for the production line.
Single period inventory model : Assuming the single period inventory model, find the cumulative probability a unit will not be sold. Please round three decimal places
Find the lcl for the r-chart : Several samples of size 9 were taken and the average range was found to be 12.9. Find the LCL for the R-chart. Round two decimal places.
Examples of people who work part time for economic reasons : Describe two examples of people who work part time for economic reasons and two examples of people who work part time for noneconomic reasons.
Discuss about the various attacks and scams : In this age of information technology, data protection has become a critical component and a priority for the companies. Advancements such as cloud computing.
Pay for additional capacity on machine a : Solve this problem graphically. How much would you be willing to pay for additional capacity on machine A?
What sorts of urban legends have you heard : What sorts of urban legends have you heard? How do urban legends originate? How do they spread?
Given the four primary types of resources : Given the four primary types of resources-CPU, memory, secondary storage, and files-select for each one the most suitable technique described
How accurate is the student in identifying words : How accurate is the student in identifying words? Which types of text can the student handle most successfully?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd