Types and effects of Cyber Threats

Thesis

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

There are different types of cyber threats that affect the users in a negative manner and they include password attack, malware attack, phishing threats, MitM, DoS and DDoS among others. 

Introduction

  1. Cyber threats refer to the possibility of a malicious trial to disrupt or damage a computer system or network. 
  1. The cyber threat may entail the trial to steal, and infiltrate or access data without legal permission from the owner (Gharibi & Shaabi, 2012).
  2. The cyber threat can act as the potential for security violation that occurs during circumstance, action, capability or occasion, which could cause harm or breach security (Crawford, 2013). 
  3. The cyber-attack can stand for offensive maneuver targeting computer information systems, personal computing devices, computer networks or computer-based infrastructures (Emerson, 2016).
  4. Based on the context of the damage caused, cyber-attacks can be labeled cyber terrorism, cyber warfare, or cyber campaign (Kerner, 2017). 

Main Point One- Distributed Denial-Of-Services (DDoS) and Denial-Of-Services (DoS) Threats

  1. The DoS is an attack that overwhelms resources in a given system, hence, affecting its response to a given service or user request (Samtani et al., 2017). 
  2. The DDoS threat refers to an attack that occurs in machines hosting huge information after being affected by malicious software monitored by the attacker, hence, contributing to destruction or loss of the organizational data (Gharibi & Shaabi, 2012). 
  1. Transmission Control Protocol (TCP) threat happens when the attackers target the systems of small in-process threat by carrying out a connection request (Tounsi & Rais, 2018).
  2. Teardrop attack leads to fragmentation and length offset sectors in chronological Internet Protocol (IP) (Samtani et al., 2017).

Main Point Two- Man-in-the-middle (MitM) threats

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  1. MitM is an attack that happens during the time hackers interfere with the communications between the user and the server.
  1. Session hijacking occurs when an attack manipulate a certain session while the interaction between the trusted network server and trusted client are interacting (Emerson, 2016).
  2. IP spoofing is applied by the hackers to persuade system that it is interacting with trusted and a known entity, hence, offering the attacker access to the system (Crawford, 2013).

Main Point Three- Phishing Threats

  1. The phishing threat refers to an aspect of sending emails that seem to come from a trusted source with an aim of obtaining personal details or influencing the users to transact a specific deal (Willard, 2007). This trickery makes many users to be conned or loss their confidential information to unintended parties (Laipson, 2017). 

Main Point Four- Malware Attack 

  1. Malware attack is a threat concerning malicious software that is installed in the targeted system without the user’s consent, hence, ending up lurking in important applications or replicate itself on the internet (Gharibi & Shaabi, 2012). 

Main Point Five- Password Attack 

  1. Password attack threat is mostly applied as a mechanism to endorse users to an information system, hence, making it easy for the attackers to illegally access the system without user’s notice (Crawford, 2013).
  1. Brute-Force is an activity of guessing the password by utilizing a random approach 
  2. A dictionary attack is an attempt to obtain passwords by copying encrypted files containing login details (Laipson, 2017). 

Conclusion

The cyber threats can be categorized into different groups including password attack, malware attack, phishing threats, MitM, DoS and DDoS. The above details offer brief information about the effects of different types of cyber threats. In consideration with this case, it occurs that there is a need for additional research to obtain a comprehensive understanding of the factors acting as cyber threats. Conversely, the online users are supposed to familiarize themselves with the above threatening elements in order to be able to cope up with them in an effective manner. 

References

Crawford, D. (2013). Emerging cyber threats ring in the new year. Communications of the ACM56(1), 20.

Emerson, R. G. (2016). Limits to a cyber-threat. Contemporary politics, 22(2), 178-196. 

Gharibi, W., & Shaabi, M. (2012). Cyber threats on social networking websites. arXiv preprint arXiv:1202.2420.

Kerner, S. M. (2017). 18 Cyber-security trends organizations need to brace for in 2018. Eweek, 1-4.

Laipson, E. (2017). How will emerging cyber threats change the way, we think about conflict?. World Politics Review (Selective Content), 1-3.

Samtani, S., Chinn, R., Chen, H., & Nunamaker, J. F. (2017). Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems, 34(4), 1023-1053. 

Tounsi, W., & Rais, H. (2018). A survey on technical threat intelligence in the age of sophisticated cyber-attacks. Computers & Security, 72212-233. 

Willard, N. E. (2007). Cyberbullying and cyber threats: Responding to the challenge of online social aggression, threats, and distress, Champaign, Research Press.

Place your order
(550 words)

Approximate price: $22

Homework help cost calculator

600 words
We'll send you the complete homework by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 customer support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • 4 hour deadline
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 300 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more