Friday, March 22, 2019
Essay --
I am hired as an Information tribute Engineer for a videogame development company. The organization cyberspace structure is given in the diagram. I was notified that vicious activities be pickings place in the network structure. They can effect protection of the keen property and highly sensitive information maintained by the organization. I am assigned to resolve these issues that arise in the network structure. In this document I will analyze and assess potential leering attacks and threats that may be carried out against the network along with potential vulnerabilities that may exist in the documented network. Also I will verbalize the potential impact of all malicious attacks & threats and identified vulnerabilities to the network and the organization. spiteful attacks and threats to network are attacks that can be done by exploiters and hackers to break down into network and steal the network information. There are different types of malicious attacks. Passive at tacks look for encrypted data and perform algorithms to decrypt. They can enter the fix where encrypted data is being decrypted or look for clear passwords. In an dynamical attack attacker bypasses or break into secured network. They can use viruses, fifth column horses, stealers, exploits or bugs (1). They can penetrate the network system to steal data or to change data or to shut down the system. A distributed attack requires that the adversary introduce code, such as a trojan horse horse or back-door program, to a trusted component or software product that will later be distributed to many other companies users Distribution attacks point on the malicious modification of hardware or software at the factory or during distribution. These attacks introduce malicious code such as a bac... ...nd Routing protocols. Operating system weaknesses includes operating system vulnerabilities like not updating the operating system. Configuration weaknesses include unsecured user accou nts, form accounts with easily guessed passwords, Misconfigured Internet services, unsecured default settings of the software products, and misconfigured network equipments. Security Policy Weaknesses include lack of written security policy, poorly elect or default passwords, inadequate monitoring and auditing, unapproved applications installation (Rufi, 2007). Mail Servers are other targets in which hackers want to gain nark to network resources. Companies that access e-mail from the Internet, especially, are potential targets (Rampat). Threats can be performed to the network when attackers production advantage of the vulnerabilities and it has a negative impact on the network.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment