Week 5 Assignment
Week 5 Assignment
Phishing is a tactic where attackers impersonate legitimate entities (like banks) to deceive individuals
into providing sensitive information. This often happens via:
Potential Impact:
Security Measures:
Implementing these measures can significantly reduce the risk of phishing attacks.
A Man-in-the-Middle (MitM) attack occurs when an attacker intercepts communication between two
parties without their knowledge. This can happen through:
- Unsecured Wi-Fi Networks: Attackers can eavesdrop on data transmitted over public networks.
- Packet Sniffing: Using tools to capture and analyze data packets traveling over the network.
Potential Impact:
- Data Theft: Sensitive information, such as login credentials or financial data, can be stolen.
- Reputation Damage: Organizations may suffer trust issues if user data is compromised.
Security Measures:
2. VPNs: Use Virtual Private Networks to encrypt all data transmitted over public networks.
4. Avoid Public Wi-Fi: Refrain from accessing sensitive information on unsecured networks.
5. Security Awareness: Educate users about the risks of MitM attacks and safe practices.
By employing these measures, individuals and organizations can effectively mitigate the risk of MitM
attacks.
Malware is malicious software designed to harm or exploit systems. Intrusion can occur through:
Potential Impact:
- Data Theft: Sensitive information, like personal or financial data, can be stolen.
- System Damage: Malware can corrupt files, disrupt operations, or crash systems.
- Ransomware: Attackers may lock files and demand ransom for access.
- Network Breaches: Malware can spread through networks, affecting multiple systems.
Security Measures:
1. Antivirus Software: Use up-to-date antivirus solutions to detect and remove malware.
2. Regular Updates: Keep software and operating systems updated to patch vulnerabilities.
3. User Training: Educate users on safe browsing habits and email security.
4. Firewalls: Implement firewalls to monitor and control incoming and outgoing network traffic.
5. Backup Data: Regularly back up important data to recover in case of malware incidents.
These measures help protect against malware intrusions and mitigate their potential impact.
[2]
1. Risk Assessment:
2. Implement Firewalls:
- Deploy both hardware and software firewalls to filter incoming and outgoing traffic based on security
rules.
- Use IDPS to monitor network traffic for suspicious activity and take action against potential
intrusions.
4. Access Controls:
- Enforce strong authentication methods (e.g., multi-factor authentication) and implement role-based
access control to limit user permissions.
5. Network Segmentation:
- Divide the network into segments to contain potential breaches and restrict lateral movement of
attackers.
- Ensure all systems and applications are regularly updated to patch vulnerabilities.
- Conduct training for employees to recognize and respond to security threats, such as phishing
attempts.
8. Data Encryption:
- Encrypt sensitive data both in transit and at rest to protect it from unauthorized access.
Evaluation of Effectiveness
- Mitigated Risks: These controls reduce the likelihood of successful intrusions by blocking unauthorized
access and detecting threats early.
- Incident Response: Quick identification and response to suspicious activities help minimize damage.
- User Awareness: Training empowers employees to avoid risky behaviors that could lead to breaches.
-Continuous Improvement: Regularly reviewing and updating security measures keeps defenses strong
against evolving threats.