NYP Report Infocomm Security Ashley Lim – 172851E 6-1-2018    Index          1.             Executive Summary                1.1          Executive Summary –Distributed-denial-of-service will continue to rise as a threat1.2          Executive Summary – The Need forImproved Security On IoT Devices Will Be More Pressing2.            Distributeddenial-of-service(DDoS) will continue to rise as a threat2.

1          WhyWould Someone Do A DDoS Attack2.2          Whyis DDoS  a Threat2.3          Natureof Threat2.4          DDoSMitigation2.5          Conclusion2.6          TextReferences3.

           CyberAttacks and Data Breaches Will Drive the Need for Cyber Insurance3.1          Causeof Threat3.2          Whyis it a Threat3.3          Natureof Threat3.4          ThreatMitigation3.5          Conclusion3.

6          TextReferences  1.Executive Summary1.1          Theaim of this report was to study security threats, their causes, nature andmitigation. After evaluating the report by Symantec, two threats were selected tobe analyzed. In conclusion, DDoS attacks will always be a threat to theInternet and IoT devices need to have more security features in place.

Main Content2. Distributed denial-of-service(DDoS)will continue to rise as a threatA Distributed Denial ofService(DDoS) attack is an attempt to make an online service unavailable byoverwhelming it with traffic from many sources. They mainly target importantresources, from banks to news websites, and pose a huge challenge to makingsure people cannot access important information.2.1 Why would someone do a DDoS attack?When a site is down, theattackers demand for money in exchange for stopping their attacks. Others useDDoS attacks as means to express their criticism to anything from government tovideo games.2.

2 Why is DDoS a threat?DDoS forces a system to crash orshut down, denying service to legitimate users. 2.3 Nature of threatAn attacker could take control ofyour computer and use it for an attack. The attacker could then force yourcomputer to send large amounts of data to a website or send spam to aparticular email address. The attack is distributed as the attacker is usingmultiple computers to launch a denial-of-service attack. The most common typeof DDoS attack is when an attacker floods a network with information.

Theserver can only process a certain number of requests at a time. The largenumber of incoming messages to the server essentially forces it to crash, denyingaccess to legitimate users.  2.4 DDoS mitigationInstall and maintain anti-virussoftware. Install a firewall and configure it to restrict traffic coming intoand leaving your computer. Avoid opening email attachments, especially from people who youdon’t know.

If you believe you are a victim of a DDoS attack, contact yourInternet Service Provider(ISP).2.5 ConclusionDistributed-denial-of-service(DDoS)will always be a threat.

Legitimate users of websites won’t be able to accessthese websites as the websites will be down and your computer could be used byan attacker for an attack.2.6 Text ReferencesThe link below is an articleabout a DDoS attack launched by a group called the ‘Lizard Squad’ onPlaystation Network(PSN) and XBOX Live. They took the servers down duringChristmas and thousands of players and people who have just gotten their newconsoles for Christmas could not get online.https://www.

cinemablend.com/games/Why-Lizard-Squad-Hacked-Xbox-Live-PSN-69163.htmlThe link below is an articleabout a DDoS attack on popular sites such as Twitter, Netflix and Reddit etc.The attack occurred on the 21 of October in the US. This  was one of the largest attack of its kind,according to experts.https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnetThe link below is an article abouta DDoS attack on BBC.

The hacker group claimed that it was only a test.https://www.csoonline.com/article/3020292/cyber-attacks-espionage/ddos-attack-on-bbc-may-have-been-biggest-in-history.html    Main Content3. The Need for Improved Security on IoT Devices Will Become MorePressingAn IoT device is any device that connects wirelesslyto a network and has the ability to transmit data. Some examples of IoT devicesare Smart Door Locks, refrigerators, cameras and many more. Technology hasadvanced more than the mechanisms to safeguard user privacy.

3.1 Cause of Threat IoT devices are vulnerable to attacks as theyare not designed with security and privacy features.3.2Why is it a Threat?There is a growing security concernregarding IoT devices as unknown devices connected to your IoT device could besecretly monitoring the network. Hackers may also hack for information forfinancial gain.3.3Nature of ThreatMost IoT devices are not designed withsecurity and privacy features, this raises a lot of security concerns andprivacy issues within the IoT networks such as confidentiality, authenticationand integrity(CIA).

Hackers will be able to monitor you through your home camera,intruding your privacy.3.4Threat MitigationMake sure your device is alwaysupdated with the latest software. Improvements in encryption to better secureyour data.3.

5ConclusionIoT devices are vulnerable to attacksas they do not have security features to deal with attacks.  Consumers are at risk of losing their privacyand valuable information to hackers. Therefore, IoT devices need to have better security features to preventthe loss of sensitive information of its users.

 3.6Text ReferencesThe link below is an article aboutsecurity concerns with IoT devices. https://www.twice.com/blog/iot-devices-raise-consumers-security-concerns-62245The link below is an article about thedangers and risks of IoT devices.https://www.itproportal.com/2015/08/02/dangers-of-iot-how-to-mitigate-risks/  

Written by

I'm Colleen!

Would you like to get a custom essay? How about receiving a customized one?

Check it out