Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Title for Your Work Introduction Write at least a few lines of about the work/to

ID: 3748832 • Letter: T

Question

Title for Your Work Introduction Write at least a few lines of about the work/topic here. Sub heading for each of the Sub Topics Write and explain, if necessary, each of the subtopics here. Be as technical as possible wherever needed. Results Add any tables or screenshots that you took showing the work you did. All the tables and figures or screenshots must accompany a title and explanation, Discussion and Conclusion Based on your understanding of the material you gathered (results), explain the significance of the technology here. Bibliography Details of any material you referred for this work such as textbook, magazines, journal articles, online sites, etc. NOTE: 1. The max nu mber of pages is around 10 Submit a Research Assignment on "Latest Information Security Threats and Attacks" The topic must talk about what are Threats and Attacks, giving at least TWO detailed examples for each and discussing the impact, and with a discussion clearly showing why the example is a Threat not an attack or vice-versa. Do not forget the Bibliography. Follow the format given under the 'Guidelines for Assignment Submission" DUE: September 17, 2018 by 9:00 am via email. Subject Line: CS321 HW01 Latest Information Security Threats and A ttnl

Explanation / Answer

Threats and attacks

Introduction

Any intentional or non intentional action which puts system in danger and exposes weakness of a system and its vulnerability leading to loss and damage is known as threat.

An attack is a direct action causing intentional harm, loss, theft to the system

Threats

Threats can be both deliberate or non deliberate such as any human error or mistakes which can lead to accidental loss of data, natural threats, any malicious activity for personal gain such as cracking the software, changing users data, locking software etc.

Example

Non Intentional

One of the best example for explaining non intentional threat is a natural calamity. Any natural disaster such as earthquake, volcanic disruption, flood or hurricanes or any terrorist activity may lead to substantial loss and damage to information system which is mostly impossible to get back.

This type of threat is not an attack which can be avoided by using some software or putting hardware restrict nor they can be predicted. Thus it is clear it is threat not attack.

Intentional Threat

Example:

Hacking is one of the deliberate attack, in which hacker breaks in the system such as Banking system, steals passwords and information and leads to loss of money to the bank and the personal.

As this is clearly a case of deliberate attack by personal which takes advantage of weakness of system, it comes in category of threats not in the attack.

Attack

Any deliberate attempt to break in system which leads to damage and loss of network, system, devices or data such as virus, malwares, ransom ware, phasing are the attacks in information system

Example

Viruses are the best example of attack. They attack the system an often make them unusable by spreading themselves which is not a threat as it does not exposes system weakness but attacks the system files in general

Conclusion

Threats or attacks- They both are biggest threat for any information system, thus we must take into account and devise out ways such as cloud storage, anti virus,anti-malware software in order to keep the damage minimum.

Bibliography

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote