271 Copyright Goodheart-Willcox Co., Inc. Section Network Threats 8.2 A notable attack occurred in 2013. Syrian hackers were able to access the Twitter network and take over the account of the Associated Press. The hackers tweeted that there were explosions at the White House and President Obama was injured. Although this was not true, it greatly affected the stock market for a brief period of time. The Dow dropped by about 150 points as traders saw the fake tweet. About $136 billion in equity value were lost. While the market quickly recovered, this incident showed how much impact hackers can have. Companies also are open to these hacks. The Wyndham hotel chain was the victim of network breeches in 2008 and 2009 in which credit card and other information for more than 619,000 customers was stolen. As a result, customers were exposed to over $10.6 million in fraudulent charges. The company was sued by the Federal Trade Commission (FTC). The FTC claimed Wyndham did not have adequate cybersecurity controls in place to protect customer data. Wyndham agreed to settle the case by establishing a comprehensive cybersecurity program. Why would sniffing a network be considered a black-hat activity? sniffing network be Key Terms denial of service (DoS) attack distributed denial of service (DDoS) attack File Transfer Protocol/SSL (FTPS) fl ood guard netstat ping sweep secure copy protocol (SCP) Secure File Transfer Protocol (SFTP) secure shell (SSH) Smurf attack SYN fl ood Telnet Learning Goals Identify preventative measures for denial of service attacks. Explain the role of ICMP in ping sweeps. Describe the function of the netstat command. Discuss security challenges for remote connections.
Previous Page Next Page