2.2Computer Attacks and abuse a) Discuss computer attack and abuse tactics b) Wh
ID: 3746236 • Letter: 2
Question
2.2Computer Attacks and abuse a) Discuss computer attack and abuse tactics b) What types of attacks and abuse has this company experienced. c) What protective measures does this company have in place for their computers? This should be two pages 2.3 End-User developed software a) Who are the end users for this company's information b) Outline the advantages and disadvantages of End-user computing with reference to this company c) List ways in which change is introduced in this company d) This should be two pages 2.4 Evaluation In one page, discuss five different ways in which the computerized accounting system used in the selected company is helping the organization to achieve its objectives. 3. Reference page 4. Attach the Mission Vision of the organization. -End- Remember the compulsory practical session during vacation school!! The module has 2 assignments and 1 Practical that replaces examinations. If you don't do the practical task it means you will not have an exam mark. That is an automatic fail. Assignment 1 Assignment 2 as a project Practical as an exam. Page 11 of 11Explanation / Answer
Question 2.2a
Different type of computer attacks are as follows
Hacking - It means to get unauthorized access to any electronic device to gain access to the data present there. So that they can get access to the private document and later exploit the user.
Social Engineering - These are different tricks are used to get unauthorized access to the system and steal the data.
Virus or Malware - Virus or Very important resources urgently seized are some program which disrupt the normal functionality of the computer
Using of Botnet
The most famous DDOS (Denial of Service) Attack
Hijacking the system.
Spoofing is way of providing a image to a conversation that it has been sent by a trusted source so that they can gain access to the private data.
There are different types of spoofing like Email, Caller ID, SMS, DNS, IP Address spoofing etc.
The usage of Cross-site scripting is also a major computer attack. In this case some malicious code is injected to current so that it can collect data from it.
We can see attack like sql Injection method in which it is used to get information from the database.
There is also w way known as the MITM or the man in the middle. When a conversation is taking place between two users then this MITM steals the information from the middle.
Question 2.2 b
The attacks and abuse that the company have high chance to experience are as follows
a.Malware
Malware is a type of malicious program which is being injected into the system to steal the information or disrupt the working of a system
b.Password Attacks
Password Attacks is a type where the hacker want to get into the system by cracking the password. In this method number of permutation and combination is used to guess the password and cracking it.
c.Phishing Attacks
Phishing works by taking the information from user by creating so called trusted image. Once the information is given. It can be exploited.
4.Denial-of-Service (DoS) Attacks
DOS is one the bad attack that the company can imagine. In this case the whole network is disrupted. The hijacker try to send high volume of data through the network so that at one point the network cannot take the data load pressure and it will fail work properly.
5.Rouge Software Attack
Rogue software is a type of software whose main motive is to collect information from the system. This software has one special thing everything in the software looks very legit. It is very tough to identify that it’s a false one.
Question 2.2 c
The different initiative that should be taken by the company to prevent the attacks are as follows
a.First and foremost we should have a strong password. We should refrain ourselves from using the common word for our password. Also the password should be changed at every regular interval.
b.Having a strong firewall as it defend the networking by checking on the network flow.
c.Having proper Antivirus and which should be updated at each time.
d.At regular interval backup of the data should be taken.
e.Last but not the least educate the others about the different attack and ways how it can be prevented.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.