0% found this document useful (0 votes)
23 views3 pages

HPXS 301 Sa2-1

The document discusses the importance of cybersecurity and ethical hacking in protecting digital assets from various threats such as Denial of Service attacks, insider threats, and vulnerabilities in IoT devices. It emphasizes the need for penetration testing, employee training, and regular security audits to mitigate risks and safeguard sensitive information. Additionally, it highlights the significance of implementing strong security measures, including data encryption and real-time monitoring, to enhance organizational security posture.

Uploaded by

zakuphema
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views3 pages

HPXS 301 Sa2-1

The document discusses the importance of cybersecurity and ethical hacking in protecting digital assets from various threats such as Denial of Service attacks, insider threats, and vulnerabilities in IoT devices. It emphasizes the need for penetration testing, employee training, and regular security audits to mitigate risks and safeguard sensitive information. Additionally, it highlights the significance of implementing strong security measures, including data encryption and real-time monitoring, to enhance organizational security posture.

Uploaded by

zakuphema
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Name: Nathasha

Surname: Maluleke
Student number: 42ha2212774
Praxis S3A (Ethical Hacking) HPSX301-1 SA2
Tzaneen Boston City Campus

Introduction

Cybersecurity is the discipline of protecting computers, servers, mobile devices,


electronic systems, networks, and data against malicious attacks. Cybersecurity is
critical for firms that want to secure their assets and preserve confidence with
stakeholders. Several dangers, including Denial of Service (DoS) assaults, malevolent
insiders, and vulnerabilities in Internet of Things (IoT) devices, pose serious concerns.
Understanding these dangers and employing strong security measures is critical to
protecting digital assets. Ethical hacking refers to permitted attempts to acquire
unauthorized access to a system, application, or data. Ethical hackers utilize the same
tools and techniques as malevolent hackers, but with the system owner's consent to
find and repair flaws.

fundamental concepts of ethical hacking and cybersecurity, focusing on


penetration testing, social engineering, vulnerability assessment, system
hacking, denial of service, cloud computing, Internet of things, and
cryptography.

Inability to access or use Denial of Service (DoS) attacks against cloud service
providers have the potential to prevent consumers from accessing their accounts. DoS
attacks can be executed by delivering malicious data to the server that crashes an
application procedure, flooding the server with multiple requests to use up all the
device's resources, continually entering wrong passwords to lock the user account,
and so forth. harmful insider from a cloud provider. Because cloud systems are shared
with untrusted parties, are accessible from the public internet, and provide enterprises
limited control over their systems, malicious insider attacks pose a severe security risk.
The likelihood that an asset will not be able to fend off a danger agent's actions is
known as vulnerability. When an object's resistance to the force being applied by the
threat agent differs from the force being applied, vulnerability arises. Based on expert
responses matched to the CIA aspects (Confidentiality, Integrity, and Availability) that
this vulnerability violates, we determine the primary weaknesses in the organizations
at this level. These weaknesses include weak security rules, inadequate access
control, and insufficient measures to avoid data leaks. Social engineering is a tactic
that involves coercing someone into disclosing private information by taking advantage
of their psychological and emotional vulnerabilities. IoT stands for the Internet of
Things, which is a network of physical objects that collects and shares data over the
internet. Due to their frequently lax security, these devices are open to intrusions.
Information can be secured by using cryptography, which converts data into a format
that can only be read by those with the necessary decryption keys. It guarantees the
validity, integrity, and confidentiality of data. The act of taking advantage of flaws in a
computer system to obtain unauthorized access is known as system hacking. It covers
methods such as backdoor creation, privilege escalation, and password cracking.

Significance in Safeguarding Quantum Comtech’s Digital Assets

Penetration testing helps identify and address vulnerabilities before malicious hackers
can use them. Workers who are trained in social engineering awareness are less likely
to fall for phishing schemes. Vulnerability assessments ensure that systems are
regularly inspected for vulnerabilities. It is morally acceptable to use system hacking
techniques to strengthen defences. DoS prevention techniques can help prevent
service outages. Cloud security protocols are required to protect data stored on the
cloud. IoT security ensures that connected devices don't act as access points for
cybercriminals. Private information is protected from prying eyes via cryptography.
Effective strategies to enhance cybersecurity.
Provide staff members with training on cybersecurity best practices, the value of strong
passwords, how to spot phishing attempts, and the dangers of social engineering. The
first line of defence against cyberattacks is knowledgeable staff. To prevent unwanted
access, encrypt sensitive data both in transit and at rest. Data encryption makes sure
that, even in the event of a compromise, unapproved parties cannot decipher the data.
Perform regular penetration tests and security audits to find vulnerabilities and fix them
before attackers can take advantage of them. Update all operating systems,
applications, and software with the most recent security patches. Numerous
cyberattacks take advantage of well-known flaws that could have been avoided with
timely patches. Install intrusion detection and security monitoring systems to instantly
identify and address any suspicious activity.
Conclusion
In conclusion, cybersecurity plays a critical role in modern organizational operations.
By understanding and reducing risks such as denial-of-service attacks, hostile
insiders, and Internet of Things vulnerabilities, organizations can significantly
strengthen their security posture. By implementing strategies like data encryption,
employee education, regular security audits, and real-time monitoring, risks can be
minimized, and sensitive information can be safeguarded. To protect digital assets
from cyber threats, a thorough security structure and preventive measures must be in
place.
Reference
• Al Nafea, R. and Almaiah, M.A., 2021, July. Cyber security threats in cloud:
Literature review. In 2021 International Conference on Information Technology
(ICIT) (pp. 779-786). IEEC. Accessed from:
• https://www.researchgate.net/profile/Drmohammed_Almaiah/publication/3534
88826_Cyber_Security_Threats_in_Cloud_Literature_Review/links/61dd6adf4
e4aff4a643475c6/Cyber-Security-Threats-in-Cloud-Literature-Review.pdf/
[Accessed 14 on September 2024].
• Kausar, S., Leghari, A.R. and Iftikhar, E., 2023. Analysis of the cyber security
challenges and solutions. Journal of Positive School Psychology, 7(1), pp.163-
171. Accessed from: https://spe-jpsp.com/wp-content/uploads/2023-1-12.pdf/
[Accessed on 14 September 2024].

• IBM, 2024. What is Ethical Hacking? Available


from: https://www.ibm.com/topics/ethical-hacking/ . Accessed on 17
September 2024.
• EC-Council, 2024. What is Ethical Hacking? Available from
https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/what-is-
ethical-hacking/. Accessed on 17 September 2024.
• CompTIA, 2024. What Is Ethical Hacking? Available
from: https://www.comptia.org/content/articles/what-is-ethical-hacking/.
Accessed on 17 September 2024

You might also like