Spear Phishing Attacks

Improved Essays
The digital revolution, which started in the 1950s, has introduced us as to the cyber world. Thanks to the Internet and wireless technologies, the information-sharing has revolutionized the world, made significant enhancements in science, engineering, and medicine; created a large number of billionaires and has a tremendous impact on our daily life. It also rendered the physical boundaries between the countries less significant because most of the mankind is now very well-connected and interacts through the Internet on a regular basis.

Despite of all the glorious advantages and the fantastic wonders of the cyber age, nations have to deal with the serious threats of cyberwarfare. Since 1998, Internet usage has been prevalent, which has opened
…show more content…
According to Ian Karambelas, phishing is “an attempt to obtain user credentials, financial data, or other sensitive information by emulating a legitimate email communication.” But spear phishing is a far greater threat than the phishing email because it is “a type of targeted phishing in which an attacker first researches the target individual or company to increase their chance of success. Because this allows the attacker to appear more trustworthy as a legitimate business entity, users are less suspicious.” (Karambelas, 2016, pg. 1). Trend Micro’s APT research team believes that spear phishing is the most favored APT attack bait. The cost of opening a spear-phishing email can be enormous. For example, the email service provider Epsilon “fell prey to a spear-phishing attack that caused the organization to lose an estimated US $4 billion.” (Trend Micro, 2012, pg. …show more content…
A “Denial of service is conducted when a multitude of systems are bombarded with traffic, which chokes the targeted networks and renders them unavailable to users.” (Hoffman, 2013, pg. 1). According to Hoffman, one of the earliest cases of DDoS was reported in 1999 against the IRC server of the University of Minnesota, which left 227 systems affected and the university’s server was out of service for several days. The DDoS attack can be crippling and often results in major disruption of business services. These types of attacks can have a significant financial impact on an organization and have the potential to cause enormous damage. In 2000, some of the most well-known Web sites in the world suffered DDoS attacks. “Major traffic generators such as Yahoo!, eBay, CNN, Amazon.com and ZDNet suffered from assaults that paralyzed their systems and barred users from accessing their services for hours.” (Hoffman, 2013, pg.

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Denial-Of-Service Attack

    • 756 Words
    • 4 Pages

    “Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A distributed denial of service attacks advises every single composed framework to send a surge of requests…

    • 364 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    How to fight Distributed Denial of Service (DDoS)? Denial of Service attacks can turn your entire organization upside down. It is almost like experiencing a worst, unpredictable disaster. Over the past few years, Denial of Service attacks made to the headlines several times and have always been frustrating the IT professionals.…

    • 409 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The most serious threat to the United States of America is not a physical terrorist attack, but rather a cyber-related one. In Washington, D.C., you can probably count on one hand the issues that both Republicans and Democrats can agree on – and this is certainly one of them. The inevitability of such a catastrophic event and the destruction that it could cause is a nightmarish scenario that without a doubt keeps our elected officials and military leaders awake at night. The questions aren’t “if,” but “when?” Imagine life for one day, or even one hour without computers or the internet.…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ddos Response

    • 1006 Words
    • 5 Pages

    Response Paper 1: Petition asks White House to make DDoS attacks a form of protest Distributed denial of service (DDoS) attacks have long existed in a controversial area of the law. DDoS is implemented by bombarding a website with requests that overwhelm the server capacity and effectively brings the website offline. This flood of traffic is often accomplished through the use of Internet connected computers that are usually maliciously controlled by hacktivists, otherwise known as bots, and involves no actual hacking . This technicality has generated debate on the appropriate punishments for DDoS cases as it could be argued that the act was not in itself illegal. Consequently, petitions have been filed, such as the one covered by Meghan Kelly…

    • 1006 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Hackers Threat Analysis

    • 1037 Words
    • 5 Pages

    Phishing is form of social engineering commonly done through email messages were hackers falsify the content of the email. The content appears to be genuine and requests users to login. Hackers are able to retrieve user’s credentials by the user’s clicking on the falsify link which direct the user’s to a bogus website and prompts a user to enter their username and password. A security company known as RSA Security LLC believes phishing was the cause of Sony’s hack. A series of phishing messages were delivered to high ranking officials and other personnel requesting user’s to check their Apple IDs.…

    • 1037 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The contribution to business practice will show how cyber-security in relation to cyber-attacks result in a profound impact on businesses and that implementing cyber security measures protects businesses from attacks (German, 2016). Therefore, businesses must understand that in light of recent world events, the cyber health and welfare of their customers are important, and not just for a consumer to business perspective. With the increase and scope of cyber-attacks, it becomes imperative that measures take place that safeguards the identities of individuals (Jenab, 2016). With the loss of $16 Billion from identity theft (Sen, 2015), as well as the 56 million users affected by a data breach in 2014 (Phair, 2014), it is incumbent on businesses to understand the detrimental effect such security breaches have not only on the particular business but the economy as a whole.…

    • 1147 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Origin The Internet has proven to be one of the greatest advancements of the twentieth century. So much so that many could not bear the possibility of not having access to it at all times. The Internet has gone through three basic forms during it’s growth, it started as an idea, became a reality as ARPANET, and expanded to the world as the Internet that is known today. Johnny Ryan points out in his book A History of the Internet and the Digital Future that the Internet is the result of a desire for quick, international communication during the cold war.…

    • 1433 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Second, routers which are used at the core of the network can be affected by modifying the behaviour of router to launch denial-of-service attack. One example is massive distributed denial-of-service attacks generated by BOTNETS which is triggered to manipulate the system without user’s knowledge. ‘The attack is triggered with a single packet, absorbs all bandwidth of the outgoing link on the router, and can propagate to all vulnerable downstream routers’(Chaski, D,Wu, Q and Qolf, T 2011,pp-2). It appears that vulnerability exploited in router leads to absorbing all the bandwidth to disrupt the operation of the router so that can bring the entire network to its…

    • 1094 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Denial-Of-Service Attacks

    • 1844 Words
    • 8 Pages

    Because DDoS attacks are distributed from many different sources, they can far more easily circumvent the security measures put in place to prevent simple DoS attacks, allowing them to quickly saturate networks with packets of information that exhausts the victim’s server in a short period of time. (Douligeris & Mitrokotsa, 2004). D) How Can I Create A Secure…

    • 1844 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    4G Case Study

    • 1404 Words
    • 6 Pages

    Computer world. [6]. Abante, Carl, "Relationship between Firewalls and Protection against DDoS". Ecommerce Wisdom. [7].…

    • 1404 Words
    • 6 Pages
    Great Essays