Thursday, May 30, 2019

IT Security Essay -- Cyber-security, Enterprise Security

Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or profits device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security measure patches, you gage minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable troubleshooting tools, it can effectively remove the possibility of DoS attacks. Also, any firewall or security software should be configured to recognize and block these attempts if possible. Back door- In a back door attack, a hacker exploits a coded opening in an application that allows them access to the users computer. By educating users to be wary of inexplicable email sources, attachments, and pirated software and multimedia, you can minimize the possibility of incidents of Trojan Back Door software being installed. Closing unused ports, maintaining updated anti-virus definitions, and running personal firewall software can also reduce the threat of back door software. Null sessions- A NULL session is an attack that exploits weaknesses in the NetBIOS networking protocol. By utilizing Windows XP version or later on PCs (or switching to Mac Haha) and making registry changes to require authenticated users, you can effectively remove the possibility of invalid sessions. Spoofing- Since spoofing refers to devices that are external to your network mimicking an internal address, configuring your firewall to deny external packets from sending from internal network addresses will prevent this type of attack. Smurf attack- By disabling conduct addressing on the router, you can eli... ..., 4th ed. Indianapolis, IN Wiley Publishing, Inc.Ryu, C., Sharman, R., Rao, H.R., Upadhaya, S. (2013). Security protection design for deception and real system regimes a model and analysis. European Journal of running(a) Resea rch, 201(2), 545-556. Retrieved from cognition Direct Database on 20 October 2014.Samuelle, T. (2009). Mike Meyers CompTia Security+ Certification Passport. New York, NY McGraw Hill.Shim, S., Chae, M, Lee, B. (2013). Empirical analysis of risk-taking behavior in IT platform migration decisions. Computers in tender-hearted Behavior,25(6), 1290-1305. Retrieved from Science Direct Database on 20 October 2014.Sullivan, J., Beach, R. (2012), Improving project outcomes through operational reliability A conceptual model. International Journal of Project Management, 27(8), 765-775. Retrieved from Science Direct database on 20 October 2014.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.