NT1310 Unit 1 Research Paper: Hacking

1018 Words3 Pages

Section 5: Information Systems and Society Approaches and techniques hackers use to steal data Methods, Tools, and Techniques for Attacks Viruses: Attackers can develop harmful code known as viruses. Viruses are used in hacking so they can break into your system or they plant viruses in emails or disks that you open at work to get into your system (Benson, 2015). Trojan horses: Users run these programs because a Trojan horse is made to look like a normal program or software the user normally uses. The codes are hidden when the program or software is ran and it can delete files and damage your computer. You usually see these done in e-mails as attachments. When you open the attachments is downloads into your system (Benson, 2015). Worms: Worms do not change …show more content…

This will help identify the damage caused and the vulnerabilities exploited within the system. It will also determine why the attack took place and the contingency plan if the organization has one (Benson, 2015). A proactive strategy is defined as a predefined step taken to prevent attacks before attacks occur. These help to determine what damage will be cause by an attack. What are the vulnerabilities and weaknesses will an attack exploit in the system (Benson, 2015). Testing Once you have carried out the reactive and proactive strategies performing a simulated attack in a test lab on test computers. Then you look over the data and see where you may have a crack in the system (Benson, 2015). The Incident Response Team Introduce guidelines for incident issues and concerns. Identify software tools to help respond to incidents and events. Perform research on known viruses, conduct training, and awareness on how to prevent these types of issues from occurring (Benson, 2015). Proactive

More about NT1310 Unit 1 Research Paper: Hacking

Open Document