The question is about the Cyber security Answer the following question in 3 to 4
ID: 2247745 • Letter: T
Question
The question is about the Cyber security
Answer the following question in 3 to 4 paragraph and Be detailed in the answer, and make sure that your answer are civil and constructive (please follow the grammer too)
Question:
Nearly a decade has passed since the National Academy of Engineers declared Cyber Security a "grand challenge for the next century." Every day there is news on ways in which cyber security challenges and responses are complicating every aspect of our lives. Can the challenge be solved?
As a first step to solving any problem, one must understand its nature. So, it is important for all cyber security analysts to keep on top of news stories in the field. In this discussion forum we will do just that with the hope that everyone will make it a daily habit throughout their career.
Today, some cyber news has been flooded out of the headlines by Hurricane Harvey, but as noted in this article, cyber concerns are front and center as students return to school.
https://www.cnet.com/news/cybersecurity-101-how-universities-are-dealing-with-hackers/
What do you think about the recommendations from Carnegie Mellon (in the link above)?
Explanation / Answer
With the increase of technology development, threat for various cyber crime increase now a days. Hackers now a days trying to develop cyber weapons that can be used against any country to demolish their economical as well as technical growth. That is why goverment has taken this issue very seriously and started think on resolving these issue. In current scenarios there are various techniques that hackers are using to do the cyber crime. The
various techniques are given below:
1) man-in-the-middle: In this type of attack, the intruder insert himself or insert any malicious code between the secure communication of two parties. This malicious code act as an third party, and its get the secure information that is being transfer between the two parties. Its third person or the intruder having access to the information send by both the parties involve in the communication.
2) mail bombing: Its refer to attack in which intruder try to send bulk of mails to the person's system, which may cause to disk full on persons system or even can crash the server, which is handling the mails. In this type of attack, the main aim is to crash the user's machine by fulling the disk space or can crash or stop the mail server.
3) War dialing: In this type of attack, hacker's uses the modem's to dial the range of numbers, for finding the computer machiner, servers and other devices. and after dialing they also get access to these type of devices.
4) Ping to death: Its a type of attack, in which the hacker send the incorrect ping packet to the user. There are various computer system which are designed not to handle the incorrect ping packets. Which results into system crash or system going into the abnormal state.
5) teardrop: Its a type of attack, in which the hacker sends the packets in incorrect way or in the fragmented way, that the end user is not able to reassemble these packets at their end, and results into the system crash and denial of service at user's end.
6)slamming-and-cramming: slamming refers to the activity in which hacker, switches the long distance calll carrier at user's phone, without its permission, its results into heavy bill at customer end. Cramming refers to the attack in which some extra bill is added into user's actual phone bill, and its keep on happening again and again
The recommendations are as follows:
1) For avoidint the phishing all the students are adviced not to install any pirated software because it can have malicious code that can be used for phishing by the hackers.
2) To avoid the hacking from the mobile devices, its adviced not to install any third party app on the mobile phones, because it can be used to hacker the various important information.
3) To avoid the various techniques used by the hacker, that are already explained above, its adviced to used the latest updated antivirus on the various university computers.
4) Cyber security can be make strong by installing the firewalls that are capable of avoiding any malicious activities.
Cyber crimes in its early statge, so its required so stop it as quickly as possible other wise, it may happen that we will see the third world war as the cyber war. Cyber crimes done at a very high level refers to the cyber terrorism. Here presener has tried to explain cyber crimes as well as the cyber terrorism.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.