Main Article Content

Abstract

In today’s data hungry and interconnected world, the use of technology has become an integral part of our daily lives. As our reliance on technology grows, so does the need to keep the data that is captured, collated, processed and disseminated through our use of such data secure. Network security relates to the field of securing such data as it is moved between systems from the prying eyes of malicious actors or others, who through various network attack methods and exploits, seek to potentially misuse this data for their own benefit and/or further their own causes. This paper seeks to analyse some recent network attacks that have been launched against companies in the past five years, how these attacks work and the societal impact that these attacks when successful, be it financially through extortion or theft, through the loss of data or reputationally where customers trust and confidence in a brand or product is negatively impacted.  Additionally, we will perform a deeper analysis of such an attack against a company as a case study and determine what happened, and what further could be done to mitigate or prevent the attack from occurring in the first place.  However, before we can perform such an analysis, we need to discuss what a network attack is and some of the types of attacks that can occur.

Article Details

Author Biography

Scott Sawyer, MIT Sydney Australia

Scott Sawyer is currently pursuing gaduate certficate in cyber secuirty at MIT sydney campus.

How to Cite
[1]
S. Sawyer, “Potential threats and mitigation tools for Network Attacks”, Ausjournal, vol. 1, no. 1, pp. 6-11, Dec. 2021.

References

[1] Cynet, "Network Attacks and Network Security Threats," [Online]. Available: https://www.cynet.com/network-attacks/network-attacks-and-network-security-threats/. [Accessed 11 September 2021].
[2] Z. Whittaker, "Two years after WannaCry, a million computers remain at risk," [Online]. Available: https://techcrunch.com/2019/05/12/wannacry-two-years-on/. [Accessed 12 September 2021].
[3] Australian Competition and Consumer Commission, "Scam Statistics," [Online]. Available: https://www.scamwatch.gov.au/scam-statistics?scamid=29&date=2021. [Accessed 12 September 2021].
[4] Australian Competition And Consumer Commission, "Government impersonation scams on the rise," [Online]. Available: https://www.scamwatch.gov.au/news-alerts/government-impersonation-scams-on-the-rise. [Accessed 12 September 2021].
[5] Australian Tax Office, "Is it a scam," 1 May 2020. [Online]. Available: https://www.ato.gov.au/General/Is-it-a-scam-/. [Accessed 12 September 2021].