Your assignment is to pick six attacks from that list which are cyberespionage,
ID: 3877931 • Letter: Y
Question
Your assignment is to pick six attacks from that list which are cyberespionage, and for each of the six, answer the following four questions:
What company, government, organization (or group of them) was the target of the attack?
Who was the attacker? If it's not know for certain, what is suspected and why?
What information was stolen in the attack?
Does it seem most likely that the information was stolen to benefit the attacker economically, for the purpose of national security, or for some other reason. You need to explain your answer to get credit for this part.
Explanation / Answer
1.IP Address Spoofing)
IP address spoofing or IP spoofing is the creation of IP packets with a false source IP address, for the purpose of hiding the identity of the sender or impersonating another computing system. In this the Attacker will create a duplicate ip address to attack on the target. Eventhough an expert who is trying to catch the attacker , cannot catch him because he used an IP which not his original and not belongs to him.
The main reason for doing these attaks is to not to be caught. and some attackers often do this on govt. websites and banking sites.
2.DOS Attack)
DOS or Denial-of-Service Attack is a type of attack , where a number of HTTP , HTTPS or FTP (or any other protocols) requests will be continuously and infinitely sends from a single source without need of responses. because of these thousands of request from a single source , the host (server) will get busy and gives responces to other requests lately and sometimes it just gets struck and halts.
most of the attackers do this on a private networks just for fun and sometimes commercially. they gets self satisfaction.
3.D-DOS-Attack)
Denial of Service.DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing aDenial of Service (DoS) attack. In this There will be a more number of systems(requesters) and there will be a partucular target(host). those all systems will do the DOS attack.
becaues of this attack the attackers can take down a host (server) very speedly. most of these attacks will be done to govt servers and some private hosts and to a banking systems.
4.Phishing attack)
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
The main of this attack is to theft the sensitive informations like usernames and passwords and credit debit cars's pin numbers.
5.Man-In-The-Middle-Attack)
This is the mostly used method by the attackers. (for Example) In this there will be two or more persons like A,B,.,.,.,.,.,.. In between there will be a man or third party member who is secretly listening to all the conversations and the data transmitted among them.
This attacks will be done mainly on chating websites or apps. and they will collect all the chat information and they will sell it to private companies.
6.Sniffing Attack)
A sniffer is an application that can capture network packets. Sniffers are also known as network protocol analizers. While protocol analyzers are really network troubleshooting tools, they are also used by hackers for hacking network. ... Once the packet is captured using a sniffer, the contents of packets can be analyzed.
This attacs will be done mainly in a netwok where number of devices are interconnected within a network.
the attackers uses softwares like wireshark,ettercap to sniff the data to find which data is transmitted over the network and what is the source and what is the destination.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.