Are Closed Digital Training Networks Vulnerable To Hackers?

2364 words - 10 pages

Are Closed Digital Training Networks Vulnerable to Hackers?

Thinking Like a Hacker: Infiltration
Seemingly, one of the things that a closed digital training networks would be almost invulnerable to is infiltration. Typically when one hears the word infiltration it conjures up images of a hacker sitting in a dark room, slumped over a keyboard of course, hacking into a Defense Department computer thousands of mile away. It is important to realize, especially with respect to a closed digital training network, that an insider attack is much more likely to occur. In his definition of an insider attack Einwechter describes that it is “a crime perpetrated by, or with the help of, a person ...view middle of the document...

Currently, in this student’s digital training network it has been found to be sufficient to utilize the deployment of Windows standard user accounts on all the systems that the Air Force student’s access and admin accounts on the lesson developer systems. A standard account is sufficient because as stated by the Windows website, in reference to standard user accounts, “A standard user account lets a person use most of the capabilities of the computer, but permission from an administrator is required if you want to make changes that affect other users or the security of the computer.” (n.d.).
While access and account rights are not the only way to limit the threat of insider attacks, it is the starting point. Along with level of access one must also look at other important ways to mitigate insider attacks. For instance training on security practices is one notion that the military and the Defense Department have done extensively. Just for general computer access one must pass several security trainings. Additionally, firewalls are also a method that be used to limit insider attacks despite the fact they are generally associated with limiting outside attacks. Firewalls can be used to protect delicate equipment such as physical database systems and different types of servers from internal attack (Einwechter, 2002).
Thinking Like a Hacker: Insertion of Malicious Code
Much like the previous section, the very nature of a closed digital training network would give the impression that it would be almost impervious to malicious code. Worms, viruses, and malware are usually thought to be the concern in the domain of systems connected to an outside network, namely the internet. Approaching the problem of malicious code like it is not a problem on a closed network may end up being a critical mistake especially if the indications are there but they are dismissed because the systems are not connected to the outside world. As stated by Patterson in his explanation of the sometimes undue focus on the internet as a culprit in accounting for malicious code “there is only one way out of the corporate network and the guiding principle is to watch the one-way-out closely” (2013).
Thinking like a hacker, how would one introduce malicious code into a closed digital training network? Almost everybody owns a device which they bring into their place of work every day and would be unremarkable even if connected to a system in broad daylight. Smart phones and similar devices, such as tablets, can be used as a container for a near limitless amount of malicious code and can usually be plugged into any system under the guise of charging the battery. Unless there is a specific rule in place disallowing the use of cell phones in the work place most IT and security personnel would probably not even bat an eye when confronted with a cell phone data cord plugged into a system on a closed network, they may even be the ones doing it. If one were inclined to...

Other Essays Like Are Closed Digital Training Networks Vulnerable to Hackers?

How To Protect Your Network From Cybersecurity

2362 words - 10 pages measures For those with the know-how, it would be possible to "fight back" with programs that can neutralize the threat. This method is used mostly by networks that are under constant attack such as government sites. Business Insider 12 Quick Internet Safety Tips That Will Save Your Digital Life From Getting Hacked * Lisa Eadicicco * * May 28, 2014, 9:50 PM If we've learned anything about cyber security in 2014, it's that hackers

Hackers are Criminals and Do Not Provide a Service

554 words - 3 pages Hackers are Criminals and Do Not Provide a Service Today the media paint a mixed picture for the public concerning the role hacker's play in our society. On the one hand they praise the skill hackers display when breaking into secure networks and wreaking havoc with clever viruses. At the same time they dramatize the damages and criminalize the activities. The perpetrators are painted out to be terrorists. This mixed message begs the question

Laudon Ch5

3522 words - 15 pages Terms 306 • Review Questions 307 • Discussion Questions 307 • Video Case 307 • Teamwork: Comparing Mobile Internet Access Devices 307 ^Case Study: Google Takes On the World 308 7.5 Chapter 8 Securing Information Systems 312 Opening Case: Flushing: A Costly New Sport for Internet Users 313 8.1 System Vulnerability and Abuse 315 Why Systems Are Vulnerable 316 • Malicious Software: Viruses, Worms, Trojan Horses, and Spyware 319 • Hackers and

Accessing the Global

4432 words - 18 pages addresses or passwords or providing data encryption. Unix systems are more vulnerable to attack because of the large numbers of portals of entry for hackers to try; whereas, Macintoshes and MS-Windows machines are more difficult to exploit because they are much smaller. However, it depends on the experience of the administrator. As an example, a Macintosh set up by a novice is more susceptible to attack than a Unix system run by very experienced

The CyberCrime Of Hacking

669 words - 3 pages cybercrimes and moves likely to be made by hackers. Information is power and always being aware of outside undertakings acts as strength against hackers. Giving hackers attention is mandatory if not a necessity. Hackers are also working harder to come up with new techniques and new technology to disarm Homeland Security. These methods cannot be easily detected. Investigating suspicious people would also help gather important information that

How Will the Advancement of Cyber Security Affect Communication on Social Media?

2183 words - 9 pages overzealous response (Singh 23). Real places and city services are vulnerable to hackers, but we can protect our water, power, transportation, and other vital systems by keeping the operating systems, antivirus and other critical software up to date. Security updates and patches are available for free from major companies (Singh 24). Social Media Security is exceptional because it focuses on technical details specific to the social media platforms

Computer Crime

3143 words - 13 pages social, smart, and opportunistic people to find new and innovative ways to commit old crimes. These people are called hackers. What is the social Problem? Computer crime is the official name given to this criminal phenomenon driven by hackers. Although a solid definition of computer crime has yet to be agreed upon by scholars, it is described in a functional manner encompassing old crimes such as forgery, theft, mischief, fraud, manipulation or

Adversaries and Ports

4593 words - 19 pages with open ports, we can reduce the vulnerabilities which our computers, servers, and networks have. Now after studying the landscape of the modus operandi of hackers, and viewing their often used tools such as port scanners, the hope is a clear look into the operations of adversaries. It is then left up to the reader to investigate their own computer, server, or network and see what ports are open and through looking up their version/ platform

Cybercrimes & Supply Chains

5257 words - 22 pages is getting easier and easier for computer hackers and frauds to gain access to confidential information from anybody. It could be passwords and social security numbers of individuals, to databases and network systems of large corporations. For businesses, the main supply chain areas at risk are the processes and controls for various departments, such as human resources, finance and accounting, procurement, and marketing. One of the processes at

Computer Crime

714 words - 3 pages useful and most are authorized to hack into the systems. Some Hackers believe that hacking is a learning experience; including creative problem solving and educating others about the vulnerabilities with computer security. I feel that Hackers that are trying to protect other people are the Hackers that don’t find themselves criminals; however it is hard to determine in certain cases and situations what is legal and illegal hacking. The White Hat

Australia - E-Health, E-Education, E-Government

2766 words - 12 pages Australia - E-Health, E-Education, E-Government Digital productivity the next frontier in the economy Smart Societies based on Artificial Intelligence Artificial Intelligence (AI) developments are accelerating, and astonishing innovations will emerge during the next few years as more companies enter this sector and spend money on developing it. AI applications are already being used in healthcare and gaming, to name just two sectors adopting

Related Papers

Why Some Uk Companies Are Reluctant To Invest In Training And Development

1650 words - 7 pages Explain why some UK companies are reluctant to invest in training and development. Do you consider these reasons to be valid? The rapid development of technology and in other areas have led companies’ ability to replicate products more easily, and the rapidly expansion of the service sector has led the nature of consumers to demand high quality at the lowest prices. Both of these highlight the importance of gaining the competitive

Hacking Essay

4628 words - 19 pages are discussed, such as the motivations that were behind guiding hackers who were at first computer professional to perform unauthorized activities, at the same time a discussion about the types of attacks can be found.The society response to hacking attacks lacks till this moment the ability to stop or completely prevent attacks from happening because as long as security tools are developed, more sophisticated hacking attacks are invented. That's

Ipremier Case Study

680 words - 3 pages . Bob Turley should have pulled the plug much sooner. He had been working at iPremier for nearly three months and should have been aware of the company’s limited hacker defense capabilities. That awareness would have meant that iPremier was very vulnerable to anything beyond the most basic cyber-attacks. There was suspicion that the hackers could be stealing credit card information, yet he left the system up and running. The plug was only pulled

Social Media Marketing Essay

1709 words - 7 pages -days marketing practices have been shifted from traditional media to digital media due to the remarkable rise in the field of social media. Present and prospective customers are now smarter than past, they are now become more aware, communicate and respond faster and their choices are now become more personalized. One of the major shortcomings of the traditional form of marketing is that, the marketers wouldn’t be able to know how many people