0% found this document useful (0 votes)
14 views6 pages

ethics in computing

this is an assignment about social and professional ethics in computing

Uploaded by

mumberederic
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views6 pages

ethics in computing

this is an assignment about social and professional ethics in computing

Uploaded by

mumberederic
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

MOUNTAINS OF THE MOON UNIVERSITY

FACULTY OF SCIENCE TECHNOLOGY AND INNOVATION

DEPARTMENT OF COMPUTER SCINCE

MUMBERE DERIC

2021/U/MMU/BIT/021

INDIVIDUAL ASSIGNMENT 1

SOCIAL AND PROFESSIONAL ISSUES IN COMPUTING

FACILITATOR: MR. BUKENYA MOSES

6th October 2024


What is a Cyber Attack?

A cyber-attack refers to an action designed to target a computer or any element of a


computerized information system to change, destroy, or steal data, as well as exploit or harm a
network. Cyber-attacks have been on the rise, in sync with the digitization of business that has
become more and more popular in recent years.

While there are dozens of different types of attacks, the list of cyber-attacks includes the 20 most
common examples.

Top 20 Most Common Types of Cyber security Attacks

DoS and DDoS Attacks

A Denial of Service (DoS) attack is aimed at overwhelming a system's resources, rendering it


incapable of handling legitimate service requests. A Distributed Denial of Service (DDoS)
attack operates similarly but uses multiple infected hosts to flood the system. The goal isn’t to
steal information but to disrupt services, which can lead to financial losses or open the system to
other attacks. An example is the February 2020 DDoS attack on Amazon Web Services (AWS).

MITM Attacks

Man-in-the-middle (MITM) attacks occur when a hacker intercepts communications between


two parties without their knowledge. By positioning themselves in the "middle," the attacker can
monitor, alter, or steal the information being shared. Strong encryption and VPNs are essential to
protect against this kind of attack.

Phishing Attacks

Phishing combines social engineering and technology, where attackers send emails that appear
to be from trusted sources. The goal is to trick recipients into clicking on malicious links,
downloading malware, or sharing sensitive information. The danger lies in the fact that users
may not realize they’ve been compromised, allowing the attacker to target others within the same
organization.
Whale-phishing Attacks

Whale phishing targets high-level executives or “big fish” within an organization. These
individuals are often targeted due to their access to sensitive information. If they fall victim to
ransomware or another attack, they may pay the ransom to avoid public embarrassment. To
avoid whale phishing, organizations should adopt the same best practices used to avoid regular
phishing.

Spear-phishing Attacks

This is a more personalized version of phishing, where the attacker researches their target to craft
a message that seems relevant to the individual. Often using spoofed emails and cloned websites,
these attacks are difficult to detect. To guard against spear phishing, recipients must carefully
scrutinize email details and avoid clicking on unfamiliar links.

Ransomware

Ransomware is malware that locks or encrypts a user’s system, demanding a ransom in exchange
for restoring access. It often exploits unpatched vulnerabilities and can spread across networks,
encrypting multiple devices. Preventing ransomware involves regularly updating systems,
employing strong firewalls, and avoiding suspicious websites or emails.

Password Attacks

These attacks aim to gain access to a system by figuring out a user’s password. Attackers may
use brute-force attacks, social engineering, or intercept unencrypted network transmissions.
Weak passwords or default credentials (like “1234567” or “admin”) are especially vulnerable.
To protect against these attacks, organizations should enforce strong password policies and
implement account lock-out mechanisms after failed attempts.

SQL Injection Attacks

SQL injection attacks exploit vulnerabilities in web applications that use databases. The attacker
injects malicious code into the database query to access, modify, or delete data. Limiting
database access to only those who need it (following the least-privileged model) and sanitizing
inputs can prevent SQL injection attacks.
URL Interpretation

In this attack, hackers manipulate URLs to gain unauthorized access to systems. By altering parts
of a website’s URL, they can potentially reach administrative sections or other restricted areas.
Secure authentication mechanisms, such as multi-factor authentication and secure passwords, are
crucial to preventing URL interpretation attacks.

DNS Spoofing

Also known as DNS poisoning, this attack involves altering the DNS records to redirect users to
malicious websites. Users might unknowingly enter personal information on a fake site, which
the attacker can then use or sell. Keeping DNS servers up-to-date and secure helps protect
against these attacks.

Session Hijacking

An attacker takes control of an active session between a user and a server by substituting their IP
address for the client’s. Using VPNs can prevent this by encrypting communications.

Brute Force Attacks

Attackers attempt to guess login credentials by systematically trying combinations. Bots often
automate this process. Lockout policies and strong, random passwords can help prevent these
attacks.

Web Attacks

Exploit vulnerabilities in web applications. Common forms include SQL injection, cross-site
scripting (XSS), and cross-site request forgery (CSRF). Web applications should be regularly
inspected and protected using anti-CSRF tokens and SameSite flags.

Insider Threats

Employees or insiders with access to critical systems can misuse their knowledge. Limiting
access and using multi-factor authentication (MFA) are effective preventive measures.
Trojan Horses

Malicious software is disguised as legitimate. When executed, it opens a backdoor for attackers.
To avoid this, users should only download from trusted sources and use Next-Generation
Firewalls (NGFWs) for inspection.

Drive-by Attacks

Malicious code is embedded in insecure websites, automatically infecting visitors. Regular


software updates and web-filtering software can protect against such attacks.

XSS (Cross-Site Scripting)

Attackers inject malicious scripts into a web page, executed when clicked by a user. Using
whitelists and sanitizing inputs can help defend against XSS.

Eavesdropping

Attackers intercept network traffic to steal sensitive information like passwords or credit card
details. Encrypting data can prevent both active and passive eavesdropping.

Birthday Attack

Exploits hash algorithms by creating matching hashes to replace legitimate messages. Using
longer hashes for verification significantly reduces risk.

Malware Attack

General term for malicious software designed to harm or spy on devices. Preventive measures
include educating users, using firewalls, and being cautious with software downloads and email
links.
REFERENCES

 "Computer Security: Principles and Practice" by William Stallings and Lawrie


Brown
 National Institute of Standards and Technology (NIST) - NIST Special
Publication 800-30: Guide for Conducting Risk Assessments
 OWASP Foundation - OWASP Top Ten Web Application Security Risks
 SANS Institute - SANS Cyber Security Resources
 MITRE ATT&CK Framework - MITRE ATT&CK
 "The Web Application Hacker’s Handbook" by Dafydd Stuttard and Marcus Pinto
 https://www.fortinet.com/resources/cyberglossary/types-of-cyber-attacks

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy