preview

Unit 3 Business Level 3 Unit 32 P1

Decent Essays

Unit 32 p1 are we safe?
Introduction
In this report I will be describing the ways in which networks can be attacked, also be giving real life example of each of the below.
Denial of service – Denial of service or DOS is an attempt to make a machine or network unavailable to its users. The services that were available to the user wouldn’t be available anymore. Although the result of a DOS attack does not lead to data theft. However a great deal of time and money can cost the company. An example of a service being stopped is email, or can be a loss of network connectivity. There could be no access to shared storage and no one would be able to access the internet while the DOS attack.

The most common type of DOS attack is ending traffic to a network address. This will cause the network to slow down. The attacker must already know a weakness of some sort on the network, or the attacker just goes …show more content…

There is another type of spoofing like email spoofing. Email spoofing is when the message appears to be from someone trusted but in an actual fact it’s not. People who distribute spam tend to use email spoofing to make you open it and respond to them. Spoofing someone in any way is illegal. It is against the law. To get round this you can delete all your spam as there is a risk there is some kind of spoofing waiting to be open. Also delete any email that is useless and do not give your email to anyone as they can send a lot of spam to your email.
Rootkit – Rootkit is a software that is downloaded onto a computer to ide the compromised operating system. This can allow other viruses or malware to come and make it look like it’s a necessary file for the computer. Even if you use an anti-virus, it will look at it but will think it’s a necessary file for the computer. The longer the rootkit is installed the harder it is to undo the damages

Get Access