0% found this document useful (0 votes)
4 views

Week 5 Assignment

Uploaded by

hassanubeey
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Week 5 Assignment

Uploaded by

hassanubeey
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

[1]

Phishing: Intrusion, Impact, and Prevention

 How Phishing Occurs:

Phishing is a tactic where attackers impersonate legitimate entities (like banks) to deceive individuals
into providing sensitive information. This often happens via:

- Emails: Fake messages urging users to click links.

- Websites: Links lead to counterfeit sites that capture credentials.

- SMS/Social Media: Similar tactics used through texts or social platforms.

 Potential Impact:

- Financial Loss: Direct theft from compromised accounts.

- Identity Theft: Misuse of personal information.

- Data Breaches: Organizations risk exposing customer data.

- Malware Installation: Links may lead to harmful software.

- Reputation Damage: Businesses may lose customer trust.

 Security Measures:

1. User Education: Train users to recognize phishing attempts.


2. Email Filtering: Use tools to block suspicious emails.
3. Multi-Factor Authentication (MFA): Adds an extra security layer.
4. Browser Security Tools: Employ extensions that flag phishing sites.
5. Incident Response Plans: Establish protocols for reporting incidents.
6. Regular Updates: Keep software up-to-date to patch vulnerabilities.

Implementing these measures can significantly reduce the risk of phishing attacks.

Man-in-the-Middle (MitM) Attack: Overview, Impact, and Prevention

 How MitM Attacks Occur:

A Man-in-the-Middle (MitM) attack occurs when an attacker intercepts communication between two
parties without their knowledge. This can happen through:

- Unsecured Wi-Fi Networks: Attackers can eavesdrop on data transmitted over public networks.

- Session Hijacking: Taking control of a user session after authentication.

- Packet Sniffing: Using tools to capture and analyze data packets traveling over the network.

 Potential Impact:
- Data Theft: Sensitive information, such as login credentials or financial data, can be stolen.

- Identity Theft: Attackers can impersonate victims for fraudulent activities.

- Data Manipulation: Altering communications or transactions can lead to financial loss or


misinformation.

- Reputation Damage: Organizations may suffer trust issues if user data is compromised.

 Security Measures:

1. Use HTTPS: Ensure secure connections with websites through encryption.

2. VPNs: Use Virtual Private Networks to encrypt all data transmitted over public networks.

3. Strong Authentication: Implement multi-factor authentication to secure user sessions.

4. Avoid Public Wi-Fi: Refrain from accessing sensitive information on unsecured networks.

5. Security Awareness: Educate users about the risks of MitM attacks and safe practices.

By employing these measures, individuals and organizations can effectively mitigate the risk of MitM
attacks.

Malware: Overview, Impact, and Prevention

 How Malware Intrusion Occurs:

Malware is malicious software designed to harm or exploit systems. Intrusion can occur through:

- Malicious Downloads: Users inadvertently download infected files or software.

- Email Attachments: Opening infected attachments from phishing emails.

- Compromised Websites: Visiting sites that host malware or trigger downloads.

 Potential Impact:

- Data Theft: Sensitive information, like personal or financial data, can be stolen.

- System Damage: Malware can corrupt files, disrupt operations, or crash systems.

- Ransomware: Attackers may lock files and demand ransom for access.

- Network Breaches: Malware can spread through networks, affecting multiple systems.

 Security Measures:

1. Antivirus Software: Use up-to-date antivirus solutions to detect and remove malware.

2. Regular Updates: Keep software and operating systems updated to patch vulnerabilities.

3. User Training: Educate users on safe browsing habits and email security.

4. Firewalls: Implement firewalls to monitor and control incoming and outgoing network traffic.
5. Backup Data: Regularly back up important data to recover in case of malware incidents.

These measures help protect against malware intrusions and mitigate their potential impact.

[2]

Steps to Deploy Security Controls Against Network Intrusion

1. Risk Assessment:

- Identify potential vulnerabilities and threats to the network.

2. Implement Firewalls:

- Deploy both hardware and software firewalls to filter incoming and outgoing traffic based on security
rules.

3. Intrusion Detection/Prevention Systems (IDPS):

- Use IDPS to monitor network traffic for suspicious activity and take action against potential
intrusions.

4. Access Controls:

- Enforce strong authentication methods (e.g., multi-factor authentication) and implement role-based
access control to limit user permissions.

5. Network Segmentation:

- Divide the network into segments to contain potential breaches and restrict lateral movement of
attackers.

6. Regular Software Updates:

- Ensure all systems and applications are regularly updated to patch vulnerabilities.

7. Security Awareness Training:

- Conduct training for employees to recognize and respond to security threats, such as phishing
attempts.

8. Data Encryption:

- Encrypt sensitive data both in transit and at rest to protect it from unauthorized access.

Evaluation of Effectiveness

- Mitigated Risks: These controls reduce the likelihood of successful intrusions by blocking unauthorized
access and detecting threats early.
- Incident Response: Quick identification and response to suspicious activities help minimize damage.
- User Awareness: Training empowers employees to avoid risky behaviors that could lead to breaches.
-Continuous Improvement: Regularly reviewing and updating security measures keeps defenses strong
against evolving threats.

You might also like