Hw1 Assignment 1

Satisfactory Essays

HW1 Assignment

Points Possible: 4 Points

Conduct a research using internet and answer following questions. You may summary from the findings, but “copy and paste” is not allowed.

1. Discusses at least five emerging threats to information security.
1. Cyberwarfare – The use of computer technology to disrupt activities in a state or organization, to deliberately attacking of information systems for strategic or military purposes. An example of cyberwarfare, is when in 2007 a foreign nation party managed to infiltrate into high tech and military agencies in the US and downloaded terabytes of information.
2. Identity theft – is when someone using another person personal information for the purpose to access the incomes, properties, money, credit, etc. The victim does not realize that he/she has been …show more content…

Hackers – A person who uses computers to gain unauthorized access to data. Most hackers use Trojan which is a malware disguised as harmless software. The intent of the hacker is to get people to click on links and phishing scams. When a person who is clueless believe it’s from somebody close to them or coworkers. But, it was hackers trying to get in through emails and stuff and they use many tools.
4. Ransomware – It is a type of malicious software designed to block access to a computer system until a sum of money is paid. You could get ransomware if you click on a bad link or open a malicious email attachment. Its hidden like a plugin or email with clean looking attachment that gets installed without the person knowing about it. United States has been the number 1 country with the most ransomware where many PC machines were affected by this tool.
5. State-sponsored attacks – State actors have objectives that revolves around political, commercial, or military field in the country they are in. They are attempting to get information about their specific targets, or gain their trust and pretend to have a mutual relationship with the third party they want to

Get Access