Question

In: Computer Science

1. Explain the factors that might lead to network intrusion through wireless connections. 2. Describe a...

1. Explain the factors that might lead to network intrusion through wireless connections.

2. Describe a cybersecurity attack or data breach that affected you personally.

Solutions

Expert Solution

Question 1.

There are many reasons for the increase in wireless attacks but the main reason in wireless is the easy access to the network makes it more prone to attacks.

The factors that lead to network intrusions are given as follows:

1. Denial of service attack: In this, the attacker limits access to the services to the user, it is done by sending a large amount of data traffic or injection of the worm of virus that leads to denial of services.

2. Problems with network configurations: A bad configuration of the network is also the main cause of vulnerability to network intrusions.

3. Unauthorized access to the access points: This is to fool the users by setting up fake access points in the network, this also makes the attacker attack the network in wireless.

4. Capturing by passive means: Here the attacker sits as an intermediate between the user and access point and captures all the required information by sniffing the network.

5. MAC Spoofing: The spoofing of the MAC address is another means where the attacker spoof the MAC address and gain access to the network.

These are the factors that lead to network intrusions in wireless connections.

Question2.

The cybersecurity or data breach attack is an attack where a malicious user gains unauthorized access to personal user data. In a data breach the confidential information that has immense value, is fraudulently stolen from the user that leads to cybercrime and data breach attacks.

The data breach attack that affected me personally was when I shared my credit card details in my bank a malicious user fraudulently taken note of my credit card number and later I used to receive calls to update my bank details and once I was asked by the OTP(One time Password) for the transaction by making a fool of me and saying that this OTP is for details update but actually the malicious user took money from my account, so this was the data breach and cybersecurity attack that I have experienced personally.

So, it's highly recommended never to share your personal details in public places, also use strong passwords to be protected against the data breach or cybersecurity attacks.

-----------------------------------------------------------Please Upvote-----------------------------------------------------------------


Related Solutions

How might leasing lead to increased credit availability? Describe some economic factors that might provide an...
How might leasing lead to increased credit availability? Describe some economic factors that might provide an advantage to leasing?
1. Describe wireless networking standards 2. Describe the process of authentication 3. Describe wireless hacking and...
1. Describe wireless networking standards 2. Describe the process of authentication 3. Describe wireless hacking and tools used by hackers and security professionals 4. Explain that configuring an AP varies depending on the embedded OS. 5. Explain how data sent by one station moves between these three components to reach a second station. 6. Explain the security improvements of 802.11i over 802.11b. Book to use: Michael T. Simpson, Nicholas Antill, Hands-On Ethical Hacking and Network Defense, Third Edition. (Chapter 11)...
1) Describe what a VLAN is and how it might be important with wireless networks.     ...
1) Describe what a VLAN is and how it might be important with wireless networks.      2) Explain why packet filtering alone is inadequate as the only form of firewall.      3) Describe the role of a DMZ when talking about perimeter firewalls.      4) Describe what a “Proxy Server” is and how it is used with firewalls.      5) Explain the role of a “personal “ firewall on a corporate network where there is a robust perimeter firewall.     ...
Explain in details what is means "there is a lack of seamless connections often experienced in  wireless...
Explain in details what is means "there is a lack of seamless connections often experienced in  wireless networks?"
a) Discuss the benefits of wireless network communication with a simple example. b) Explain why wireless...
a) Discuss the benefits of wireless network communication with a simple example. b) Explain why wireless network communication is slower than wired network communication on most occasions. c) Wireless bridges are gaining popularity in connecting discrete campuses or business premises. Discuss the advantages and disadvantages of wireless bridges.
1- Identify and describe the categories and models of intrusion detection and prevention systems. 2- Define...
1- Identify and describe the categories and models of intrusion detection and prevention systems. 2- Define and describe honeypots, honeynets,and padded cell systems.
Explain how the value of a social media network increases with the number of connections. Apply...
Explain how the value of a social media network increases with the number of connections. Apply concept to explain why Facebook or Google often purchase new, unprofitable startup social media companies for billions of dollars.
1. Identify how wireless technologies are used in various industries. 2. Explain the advantages to wireless...
1. Identify how wireless technologies are used in various industries. 2. Explain the advantages to wireless technologies. 3. Explain the disadvantages with wireless technologies. 4. List and describe the 5 major wireless standards organizations and their functions. 5. Describe the differences between WLAN, WPAN, WMAN and WWAN.
Identify 2 factors that you believe cause an economy to grow. Describe how these factors might...
Identify 2 factors that you believe cause an economy to grow. Describe how these factors might increase output or incomes over time. As you think about this, consider that not all economies grow at the same rate. If you have information about differences in growth rates across countries, use this information to inform your thought process.
1. Explain the flow of the blood as it passes through the heart. 2. Describe the...
1. Explain the flow of the blood as it passes through the heart. 2. Describe the Flank-Starling law in the heart. 3. In a resting state, explain what happened to the stroke volume when the heart rate increased. Why does this occur? 4. Describe how the heart alters stroke volume under sympathetic stimulation.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT