close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Cyber Attack

downloadDownload printPrint

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

A cyber attack is an attack initiated from a computer against a website, computer system or individual computer that compromises the confidentiality, integrity or availability of the computer or information stored on it.

Cyber attacks take many forms, including:

  • Gaining, or attempting to gain, unauthorized access to a computer system or its data.
  • Unwanted disruption or denial of service attacks, including the take down of entire web sites.

Every Organization should create a written compliance plan to monitor the highest risks for a potential cyber attack. The compliance plan must address cyber attack procedures in addition to other compliance matters. this should include:

  • Policies.
  • Codes of conduct.

Policies

Privileged password management Policy

Privileged password management is a type of password management used to secure the passwords for login IDs that have elevated security privileges. This is most often done by periodically changing every such password to a new, random value. Since users and automated software processes need these passwords to function, privileged password management systems must also store these passwords and provide various mechanisms to disclose these passwords in a secure and appropriate manner. Privileged password management is related to privileged identity management.

Firewall

The main aim of the firewall technology is to protect the sensitive information moving between the two networks. In a real world scenario firewall is placed between a private network and internet to prevent attacks. Firewall is one of the most essential barriers that can defend computer networks from many threats. The firewall at the perimeter of the network is the first line of defence against external attacks.

Padlock Software

Padlock is a very new entrant into the world of open source password managers. Currently available for Windows, Mac, iOS, and Android, with a Linux client in the works, Padlock is designed as a “minimalist” password manager. Its source is available on GitHub under a GPLv3 license. The project is also developing a cloud backend, also open source, which will be a welcomed addition to anyone tired of managing password files or setting up syncing across multiple computers.

Controls for implementation of Policies

Packet-filtering Firewall

This was the first type of firewall to protect the networks. Packet filtering firewall check the source and destination IP address of the packet and let the packets in or out according to the security policy of the organization. Normally gateway router on the network edge is used to filter these packets. Access control list (ACL) can be configured on the router to act like packet filtering firewall. Based on the access rules router can allow or deny access into the network.

ConfigServer Security

Configserver security and firewall is a cross-platform and a very versatile Firewall, it’s also based on the concept of Stateful packet inspection (SPI) Firewall. It supports almost all Virtualization environments like Virtuozzo, OpenVZ, VMware, XEN, KVM and Virtualbox.

infoRemember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism-free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Cyber Attack. (2018, December 17). GradesFixer. Retrieved June 15, 2021, from https://gradesfixer.com/free-essay-examples/cyber-attack/
“Cyber Attack.” GradesFixer, 17 Dec. 2018, gradesfixer.com/free-essay-examples/cyber-attack/
Cyber Attack. [online]. Available at: <https://gradesfixer.com/free-essay-examples/cyber-attack/> [Accessed 15 Jun. 2021].
Cyber Attack [Internet]. GradesFixer. 2018 Dec 17 [cited 2021 Jun 15]. Available from: https://gradesfixer.com/free-essay-examples/cyber-attack/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! This essay is not unique. You can get a 100% Plagiarism-FREE one in 30 sec

    Receive a 100% plagiarism-free essay on your email just for $4.99
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer
    exit-popup-close

    Haven't found the right essay?

    Get an expert to write you the one you need!

    exit-popup-print

    Professional writers and researchers

    exit-popup-quotes

    Sources and citation are provided

    exit-popup-clock

    3 hour delivery

    exit-popup-persone