List all the possible attacks that can be performed on the company. For each att
ID: 3871277 • Letter: L
Question
List all the possible attacks that can be performed on the company. For each attack list the potential damage as well if it does violates the CIA triad? If it does violate the CIA triad specift which part.
Consider a company whose operations are housed in two buildings on the same property: one building is headquarters, the other building contains network and computer services. The property is physically protected by a fence around the perimeter. The only entrance to the property is through the fenced perimeter. In addition to the perimeter fence, physical security consists of a guarded front gate. The local networks are split between the Headquarters' LAN and the Network Services' LAN. Internet users connect to the web server through a firewall. Dial-up users get access to a particular server on the Network Services' LAN Firewa LAN Connection Guard Gate Headquarters Network and Computer Services Fences Figure 1 lustration of the CompanyExplanation / Answer
CIA Triad nothing but confidentiality,identity and availability.
Confidentiality:
Confidentiality is roughly equivalent to privacy.
Integrity:
Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle.
Availability
The CIA triad goal of availability is the situation where information is available when and where it is rightly needed. The main concern in the CIA triad is that the information should be available when authorized users need to access it.
List of attcks which performed on the company and potential damage given below:
Evesdropping:
An attacker who has gained access to data paths in your network to "listen in" or interpret (read) the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping.It viollates the Confidentiality(of CIA triad) of data.It attacks the both the headquarters and Network and computer services building.
Data Modification
Since data is already read by attacker, next step is to modify the data, so data will be modified.So it affects the Integrity of of CIA triad because due to data modification data may be inconistent not be correct.and also it affects the avialability of CIA triad(due to data modification, the data may be deleted so it may not available). so It will affect whole system.
Identity Spoofing (IP Address Spoofing)
Most networks and operating systems use the IP address of a computer to identify a valid entity. In certain cases, it is possible for an IP address to be falsely assumed— identity spoofing. An attacker might also use special programs to construct IP packets that appear to originate from valid addresses inside the corporate intranet.
After gaining access to the network with a valid IP address, the attacker can modify, reroute, or delete your data. The attacker can also conduct other types of attacks.This violates all the CIA triad.It first attacks firewall then it attacks whole system.
Denial-of-Service Attack
The denial-of-service attack prevents normal use of your computer or network by valid users.
The attacker can do any of the following:
Randomize the attention of your internal Information Systems staff so that they do not see the intrusion immediately, which allows the attacker to make more attacks during the diversion.
Send invalid data to applications or network services, which causes abnormal termination or behavior of the applications or services.
Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.
Block traffic, which results in a loss of access to network resources by authorized users.
It affects all the CIA triads, and it affects the entire system.
Man-in-the-Middle Attack
A man-in-the-middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparently. For example, the attacker can re-route a data exchange. When computers are communicating at low levels of the network layer, the computers might not be able to determine with whom they are exchanging data.
It violates all the parts of CIA triad. and it affects the entire system.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.