Question
Part 1. Cyber and Physical Attack Types Question 1 - In your own words, describe each of the below attack types (objective/goal and how they
Part 1. Cyber and Physical Attack Types
Question 1 - In your own words, describe each of the below attack types (objective/goal and how they work (in general)). Please provide protection strategies against these attacks in your response:
Privilege Escalation DNS Poisoning Domain Hijacking Zero-day Client Hijacking Evil Twins | Driver Manipulation Spoofing Wireless Replay Rogue Access Points Wireless Jamming WPS Attacks |
It's important to recognize that many of these attacks can be used together to devastate a system. A RAT can be used to install a backdoor, allowing for a threat actor to pivot, escalate their privilege level and then poison your DNS server to send you to a spoofed website to capture your credentials. These attacks will usually work together to achieve a specific goal. Thinking about how these attacks work together and what we can do to interrupt them is an important part of cyber defense.
Question 2 - Compare and contrast DNS Poisoning and Domain Hijacking.
Question 3 - What general security advice would your give a new company looking to start a cyber security/malware defense program? Justify your suggestions / claims.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started