**PLEASE ANSWER ALL OF THE FOLLOWING! THANK YOU 1. What is the difference betwee
ID: 3876369 • Letter: #
Question
**PLEASE ANSWER ALL OF THE FOLLOWING! THANK YOU
1. What is the difference between a threat agent and a threat?
2. What is the difference between vulnerability and exposure?
3. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why?
4. What is the difference between a skilled hacker and an unskilled hacker (other than skill levels)? How does the protection against each differ?
5. For a sniffer attack to succeed, what must the attacker do? How can an attacker gain access to a network to use the sniffer system?
Explanation / Answer
Solution:
Answer 1:
Threat: The word ‘threat’ is generally stands for negative events and kind of things, persons, or other type of entities that represents a potential danger to an asset. Threats can affect or become more dangerous when the vulnerability presents in a system.
For example, threats can affect data in your personal system. An unauthorized user can steal your personal data from your website. A fire can start in your datacenter. These are the some example of threats.
Some general threats are Viruses, worms, and other types of malware.
Threat Agent: When you know about the threats then you can easily know about the Threat Agent. A threat agent can be a person or entity that is the responsible of an attack. It is a specific type of virus, malware or worm.
For example, if the fire is started by an accidental circuit short then the short is the threat agent. In some scenarios, it doesn’t make sense to talk about the threat agent such as, flood, earthquake or any natural phenomenon.
Some general Threat Agents are: the Blaster Worm, Cybercriminals and Hacktivist etc.
Answer 2:
Vulnerability: It is a fault or weaknesses in a system. It is generally a protection mechanism that opens it to attack or damage. Some types of vulnerabilities are SQL injection, unauthorized user access and Cross-site scripting etc.
Exposure: It is a state or condition of being exposed. Exposure exists when a vulnerability known to an attacker is present in information security.
Answer 3:
Networking technology has created more risk for businesses that use information technology because now-a-days business networks are directly connected to the internet and other networks external to the organization due to which the people can unauthorize access to the organization’s networks.
Using the networking technology, the potential attackers can easily access to these information systems when they have been networked, mainly if they are interconnected to the Internet. It has created more of a risk because information can travel much faster from locations.
Answer 4:
Skilled Hacker:
An expert hacker is generally can be a software developer, who develops software and codes to exploit relatively unknown vulnerabilities. The expert hacker is generally a well-known or master of several programming languages, networking protocols, and operating systems.
Unskilled Hacker:
An unskilled hacker is generally not expert in programming and coding but uses scripts and code developed by skilled hackers. They do not write own codes and are often relatively unskilled in programming languages, networking protocols, and operating systems.
Protection against each differs:
Protecting against an expert hacker is much more difficult, due in part to the fact that most of the time the expert hacker is using new, undocumented attack code. This makes it almost impossible to guard against these attacks at first. Conversely, an unskilled hacker generally uses hacking tools that have been made publicly available. Therefore, protection against these hacks can be maintained by staying up-to-date on the latest patches and being aware of hacking tools that have been published by expert hackers.
Answer 5:
For a sniffer attack to succeed, the attacker must do the following things:
The attacker can gain access by getting inside your network, which means a physical device connected to the network or maybe control a device inside your network.
An attacker can gain access to a network to install a physical sniffer device by using the social engineering. The installation of the sniffer can be proficient, an unaware employee to instruct the attacker as to the location of the networking equipment.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.