17 May Respond With 250 Word
ryan harris | a day ago | 404 words
While I feel that any of the threats listed are dangerous, phishing might be the most dangerous because of the amount of people it affects. Phishing is described as sending an unsolicited email, message, or phone call under the guise of a legitimate source and lures the user into accepting malware or disclosing personal information. (Bayuk et al, 2012). The reason that these are so threatening is that an adversary can send out phishing emails in mass quantities with very little fear of reprisal. In 2014 it was estimated that over $15.4 billion dollars was stolen in total, due to identity theft. (Gredler, 2016). Every year Verizon releases the Data Breach Investigation Report (DBIR) that outlines the most common breaches, tactics used and common trends. In the 2017 DBIR it was determined that 66 percent of the attacks involved malware that was installed via malicious email attachments. (Verizon, 2017). 95 percent of phishing attacks that lead to a breach were then followed by software installation. This is a very real threat that affects a vast majority people world-wide, more than the other types of threats listed.
Another threat that isn’t listed, but is also very dangerous is Man-in-the-middle style attacks. MitM involves the attacker intercepting communications from the user before the recipient gets the information, and inversely impersonates the user. (Bayuk et al, 2012). This can be done with cellular or wireless technology, and the victim may not know that they are being monitored. This form of attack is a type of eavesdropping and can perpetuate identity theft. The attackers usually access an unsecured, weak, or open network and insert their tools. In 2015 almost 50 individuals were arrested for using MitM attacks to intercept payment requests that were made via Email. (Vaas, 2015). The suspects had used social engineering and phishing to install malware on company networks. After the malware was installed they were able listen in on transaction data and payment requests. In this case, a more malicious attack was instigated by simple phishing attempts.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
