Language:EN
Pages: 5
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
firewall can installed order block unwanted connec

Firewall can installed order block unwanted connections and protect the system

WEEK 2-6

Week 2
1.

c. Prevention mechanism: Organisation should assess what information might be available to the attackers. Implement the technology for fraud detection and identification.

2. When an accounting firm is attacked by using a credential harvesting attack then all their documents including customer private information are prone to leak. This will cause the company to lose its contract with customers and cause a loss of reputation.

a) As the government is the most important part of the country the privacy of the data should

be kept confidential and secure. There need to be an alert mechanism in the concerned

c) Threat to financial institutions
● Sensitive information like credit card details is being compromised.

● Users' privacy will be invaded and their transactions will be publicly available.● Unauthorized money transfers can happen.

information on the account.

● The casino has a lot of transactions related to API which is very sensitive and private.

3. Prevention method from MITM:
● If the attack is present then the server should be shut down temporarily. ● Only use the whitelisted IP and use VPN for a long-term solution.

● Implement checksum approach where user sent the request with some value

Week 4
1. CPU hijacking is illegal crypto mining which is the unauthorized use of someone else CPU to mine for cryptocurrency.

a. Attack Mechanism
The first way is by tricking the victim to load the crypto mining code onto their computers. This is done by phishing tactics where the victim receives the legitimate- looking email and encourages the victim to click on the link and the link runs the code that places the cryptomining script on the computer, which runs in the background without knowing of the victim.

2. If the college computers got harvested for cryptomining then it will affect the speed and efficiency of the computers. The teacher won’t be able to perform the teaching activities due to slow speed and students might not be able to complete their tasks. It will waste the computational capabilities of the computers.

To prevent CPU hijacking I would advise my client to install the ad-blocking extension on all 3.

a. Resource rich and resource depleted components of IOT

Resource rich are components are such device which have software and hardware which support TCP and IP protocols. e.g. micro controlled based appliances.

Things to consider while choosing the cloud servers can be cost, security, and scalability.

c. IoT communication protocols

3. If I was to design IOT infrastructure for NAB I would focus on following IoT services:

● Cloud storage: Implementing cloud storage can help the data to be secured on cloud and decrease the use to upgrade the hardware along with the time.

1. a. Attack mechanism

The ways hackers use to attack SCADA systems on IoT networks are SQL injection, malware, phishing emails, and malicious link. The attacker use code to manipulate the user to click on the link and get access to the system.

2. It will affect both business and customers. Attackers might use the data of customers and businesses to perform illegal activities. The business may go on loss and customers may lose their personal identification and accounts
3. I would recommend the client disconnect the unwanted network connection which can minimize the risk of getting attacked. A firewall can be installed in order to block unwanted connections and protect the system.

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Sam Holloway-Wells

PageId: DOCA1A9508