Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

in this assignment, you need to pretend to be ethical hackers who need to protec

ID: 3633411 • Letter: I

Question

in this assignment, you need to pretend to be ethical hackers who need to protect their organization from a computer attack. List the general phases of a computer attack. Thinking like an attacker, you should add items to each phase that an attacker would consider when preforming a successful computer attack.

The phases of attack include:

Reconnaissance

Discovery

Fingerprinting

Targeting

Intrusion

Privilege escalation

snooping and eavesdropping

Remote access

Zombies


self assessment checklist

I have identifed at least 3 phases of a computer attack
in my answer i have included the factors the attackers take into consideration when targeting computers or networks

Explanation / Answer

Snooping/Eavesdrooping:

·         Listens to the conversation

·         Decode the conversation

·         Monitor keystrokes and guess passwords

·         Intercept the data transfers and emails

Finger printing:

·         Availability of the host

·         Network topology being used.

·         Scan the port and listening to it

·         Type of the OS being used in the system and its behavior

Intrusion:

·         Having a close look and observation on the user

·         Identifying the user’s behavior and guessing passwords