Preview

You Decide- Sec572 Week 2

Good Essays
Open Document
Open Document
577 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
You Decide- Sec572 Week 2
You Decide – Assignment 1

SEC572 – Week 2

To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.
Denial-of-service DoS attacks DoS attack is simply to send more traffic to a network address than the programmers who planned its data buffers anticipated someone might send. The attacker may be aware that the target system has a weakness that can be exploited or the attacker may simply try the attack in case it might work. According to AppliCure Technologies preventing Denial of Service Attack With dotDefender web application firewall you can avoid DoS attacks because dotDefender inspects your HTTP traffic and checks their packets against rules such as to allow or deny protocols, ports, or IP addresses to stop web applications from being exploited

Masquerade is a disguise. In terms of communications security issues, a masquerade is a type of attack where the attacker pretends to be an authorized user of a system in order to gain access to it or to gain greater privileges than they are authorized for. A standard strategy to resist this kind of attack is to create innovative algorithms that can efficiently detect the suspicious actions, which could result in the detection of imposters.

The concept of IP spoofing decreased due to the demise of the services they exploited, spoofing can still be used and needs to be addressed by all security administrators.
According to Jonathan Hassell can prevent IP spoofing and its related attacks from affecting your network: Use an access control list to deny private IP addresses on your downstream interface.

SMURF attack, when your machine sends this spoofed packet to the broadcast

You May Also Find These Documents Helpful

  • Good Essays

    Experiencing problems with the web site is the most prominent signs that a database, attack that can occur. The attack on a computer hosts are often zombie computers with broadband connections to the internet threat have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and direct the attack, often through a botnet/dosnet. Launching a DoS attack can have a negative impact on the business of an organization. The result of the attacker can lead to a loss of reputation along with economic losses. A successful DoS (Denial of Service) attack can disable computers and subsequently, an entire network. An attack launched by a moderately configured system can crash PCs that are of high value. The following steps should be followed when conducting a DoS penetration test: 1) Test heavy loads on the sever; 2) Check for systems and devices vulnerable…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The Richman Company is a successful and prosperous firm with branches in eight locations throughout the country and Canada. To support its growth, the company uses both an intranet and an extranet network. These networks are essential to the successful operation of the company because they provide the means of communicating with all employees, who use the intranet to enroll in company benefit programs. These networks also allow all of the company’s business partners, vendors and privileged customers to gain information about the company. In recent years, the company has been expanding rapidly. As one of the company’s interns, I have been asked to analyze the company’s vulnerabilities and make a plan to protect company assets and to utilize available technology most effectively. Before making the final proposal, I examined Richman’s use of the intranet and the extranet networks and found problems that require immediate attention.…

    • 1171 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Social Engineering

    • 1041 Words
    • 5 Pages

    Granger, S. (2001, december 18). Social Engineering Foundamentals. Retrieved April 18, 2011, from http://www.symantec.com: http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics…

    • 1041 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Network Security

    • 1567 Words
    • 7 Pages

    DoS attacks are particularly malicious because although they do not provide intruders with access to specific data, they "tie up" IS resources, preventing legitimate users from accessing applications. They are…

    • 1567 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    DoS is the short form of denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install…

    • 803 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    ABSTRACT This paper presents a new mechanism for delivering Qual- ity of Service (QoS) guarantees for web-based applications in the face of Distributed Denial of Service (DDoS) attacks. It accomplishes this by scheduling incoming requests based on a valuation/cost analysis to prioritize and service these requests in a more e±cient manner. This research di®ers from previous works by collaborating with the web server 's Operating System (OS) through the use of probes, which provide active feedback of application resource state. Other heuristics that have proven successful in DDoS detection and prevention are also employed in an extensible framework to facilitate site-speci¯c customization.…

    • 1460 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    from spam and phishing to malware and denial-of-service (DoS) attacks. Much of it thrives on armies of compromised hosts, or botnets, which are scattered throughout the…

    • 8864 Words
    • 36 Pages
    Better Essays
  • Powerful Essays

    Non Blind Hijacking

    • 3370 Words
    • 14 Pages

    Introduction This paper makes no assumptions of prior knowledge in TCP session hijacking or blind and nonblind IP spoofing. We will cover all basics and provide both a novice and advanced introduction to these topics. Although there are countless papers and books on the subject of TCP/IP, I always believe that there exists a much less intricate definition that can be provided by other people. We aim to provide our definition in an effort to hopefully clearly articulate this often convoluted labyrinth of networking. First off, what exactly is TCP Hijacking? The meticulous craft of TCP hijacking is simple. The exploit relies on the violation of trust relationships between 2 communicating hosts. An attacker can grab unencrypted traffic from a victim’s network-based TCP application, further tampering with the authenticity and integrity of the data before forwarding it on to the unsuspecting target. The first phase of solving this labyrinth is to understand the TCP/IP protocol suite. When two computers on the Internet wish to establish a session with each other, a much more intricate processes take place other than loading Netscape and hitting [go]. Communication over the Internet is conducted through packets, a process involving multiple layers. Packets first traverse down the stack of the sending host, than reverse up the stack at the remote. Each layer in the stack wraps the packet on the sending side and than unwraps it at each layer on the receiving. This stack, also known as the TCP/IP Internet model consists of four layers (not to be confused with all 7 layers of the OSI standards model). Each layer of the stack adds its own proprietary "tag" to each segment of the packet. I have documented the communication processes between stacks in the below diagram.…

    • 3370 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Cognitive Hacking

    • 2741 Words
    • 11 Pages

    In this paper, we define a category of computer security exploits called "cognitive hacking." Loosely speaking, cognitive hacking refers to a computer or information system attack that relies on changing human users ' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that operate solely within the computer and network infrastructure. Several cognitive hacking techniques are illustrated by example and a taxonomy for these types of attacks is developed. Technologies for preventing and mitigating the effects of cognitive hacking attacks are proposed as well.…

    • 2741 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    spoofing

    • 2478 Words
    • 10 Pages

    Another way spoofing takes place on the Internet is via IP spoofing. This involves masking the IP address of a certain computer system. By hiding or faking a computer's IP address, it is difficult for other systems to determine where the computer is transmitting data from. Because IP spoofing makes it difficult to track the source of a transmission, it is often used in denial-of-service attacks that overload a server. This may cause the server to either crash or become unresponsive to legitimate requests. Fortunately, software security systems have been developed that can identify denial-of-service attacks and block their transmissions.…

    • 2478 Words
    • 10 Pages
    Better Essays
  • Good Essays

    DDoS Attack

    • 270 Words
    • 2 Pages

    A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.…

    • 270 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Types of Network Attacks

    • 339 Words
    • 2 Pages

    Denial-of-Service (DoS) : A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers make DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows:…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Blocking/Unblocking functionality of the network program uses Address Resolution Protocol (ARP) spoofing or also known as ARP poisoning technique. ARP spoofing can be achieved using Jpcap library to build an ARP packet, Ethernet packet and other packet types. Winpcap is also used to supplement the network program in accessing the raw network resources (i.e. Winsock for Windows).…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cryptology

    • 2017 Words
    • 7 Pages

    Being based on the concept of transferring data through intermediate nodes, the very nature of Transmission Control Protocol/Internet Protocol (TCP/IP), the basic communication protocol over the Internet and intranets, makes it possible for an adversary to interfere with communications. Any TCP/IP session may be interfered with in the following ways:…

    • 2017 Words
    • 7 Pages
    Better Essays

Related Topics