Question: Part 1. Cyber and Physical Attack Types Question 1 - In your own words, describe each of the below attack types (objective/goal and how they

Part 1. Cyber and Physical Attack Types

Question 1 - In your own words, describe each of the below attack types (objective/goal and how they work (in general)). Please provide protection strategies against these attacks in your response:

Privilege Escalation DNS Poisoning Domain Hijacking Zero-day Client Hijacking Evil Twins Driver Manipulation Spoofing Wireless Replay Rogue Access Points Wireless Jamming WPS Attacks

It's important to recognize that many of these attacks can be used together to devastate a system. A RAT can be used to install a backdoor, allowing for a threat actor to pivot, escalate their privilege level and then poison your DNS server to send you to a spoofed website to capture your credentials. These attacks will usually work together to achieve a specific goal. Thinking about how these attacks work together and what we can do to interrupt them is an important part of cyber defense.

Question 2 - Compare and contrast DNS Poisoning and Domain Hijacking.

Question 3 - What general security advice would your give a new company looking to start a cyber security/malware defense program? Justify your suggestions / claims.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!