个人陈述代写

澳洲代写论文:信息安全攻击

澳洲代写论文:信息安全攻击

由于在XYZ银行可怜的信息技术,银行面临大量的信息安全攻击。这些攻击可能源于前面部分所确定的威胁。这些信息安全攻击的细节如下,

1.分布式拒绝服务攻击1.ddos或是一个安全的网络攻击,洪水大量的交通直到它超越网络的限制。未能处理压倒一切的流量,网络下去,成为不合法用户。攻击者使用妥协的计算机或僵尸网络的攻击。网络就像XYZ银行,有这么多的漏洞,几乎没有任何安全措施,都不太可能对DDoS攻击的一个合适的目标。这将导致严重的业务停机时间,对业务的损失,可能是银行的资产损失。

2,恶意软件的攻击可以造成的病毒,间谍软件,木马,后门等,这些分类下的软件攻击是影响XYZ银行系统很有可能。银行没有防火墙,防病毒软件。所以这种病毒攻击可能会爆发进银行的系统。这些类型的恶意软件攻击是潜在的危险。有时很难找到来源。在许多情况下,病毒隐藏在系统做滋扰喜欢偷窃数据,浪费计算资源等。它将把整个基础设施性能严重(Andress,2014)。

3.Spam是另一种可能影响电子邮件系统的攻击类型。垃圾邮件类似于电子垃圾邮件。在这里,攻击者发送不请自来的垃圾邮件给收件人。由于没有内容过滤,电子邮件服务器很可能成为垃圾邮件攻击的受害者。垃圾邮件是一个严重的安全考虑,因为它可能会扩展到严重的安全攻击提供间谍软件,木马和其他类型的恶意软件。它可以用于发现网络钓鱼攻击的目标(Forouzan,2012)。

澳洲代写论文:信息安全攻击

Due to the poor information technology in XYZ bank, the bank is exposed to a number of information security attacks. The attacks may stem from the threats identified in the previous section. Details of such information security attacks are given below,

1.DDoS or Distributed Denial of Services attack is a security attack that floods the network with huge amount of traffic until it goes beyond the limit of the network. Failing to handle the overwhelming traffic, the network goes down and becomes unavailable to the legitimate users. Attackers use compromised computers or zombie networks for such attacks. A network like XYZ bank, that has so much vulnerability and almost no security measurements, are likely to be a suitable target for the DDoS attack. It will cause severe business downtime, losses to the business and may be losses to the assets of the bank.

2.Malware attack can be caused by virus, spyware, Trojans, rootkits etc. These are categorized under software attack and are highly likely to affect the systems of XYZ bank. The bank has no firewall, antivirus software. So such virus attack may outbreak into the bank’s systems. These types of malware attacks are potentially dangerous. It is sometimes hard to find the sources. In many cases the viruses remain hidden in the system and do nuisances like stealing of data, wasting computing resources etc. It will downgrade the performance of the whole infrastructure severely (Andress, 2014 ).

3.Spam is another type of attack likely to affect the email system. Spam is similar to electronic junk mails. Here, the attacker sends unsolicited junk mails to the recipients. As there is no content filtering, the email server is likely to be a victim of spam attack. Spam is a serious security consideration as it may be extended to severe security attacks by delivering spyware, Trojan and other types of malware. It can be used for finding target for phishing attacks (Forouzan, 2012).