Saturday, February 9, 2019
IT Security Essay -- Cyber-security, Enterprise Security
Denial of service (DoS)- This type of onset occurs when a hacker overloads a server or network artifice with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to move to valid requests. By updating to the latest service pack and applying pledge patches, you can smear the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove semiprecious troubleshooting tools, it can effectively remove the possibility of DoS attacks. Also, any firewall or security softwargon should be configured to recognize and block these attempts if possible. stake door- In a back door attack, a hacker exploits a coded opening in an application that allows them access to the users computer. By educating users to be wary of unknown email sources, attachments, and pirated software and multimedia, you can minimize the possibility of incidents of Trojan Back Door software being installed. closing curtain unu sed ports, maintaining updated anti-virus definitions, and running personal firewall software can also surmount the threat of back door software. Null school terms- A NULL session is an attack that exploits weaknesses in the NetBIOS networking protocol. By utilizing Windows XP version or later on PCs (or switching to Mac Haha) and making registry changes to implore authenticated users, you can effectively remove the possibility of null sessions. Spoofing- Since spoofing refers to devices that are external to your network mimicking an inner(a) address, configuring your firewall to deny external packets from sending from internal network addresses will prevent this type of attack. Smurf attack- By disabling circularise addressing on the router, you can eli... ..., 4th ed. Indianapolis, IN Wiley Publishing, Inc.Ryu, C., Sharman, R., Rao, H.R., Upadhaya, S. (2013). pledge protection excogitate for deception and real system regimes a model and analysis. European daybook of Opera tional Research, 201(2), 545-556. Retrieved from Science Direct Database on 20 October 2014.Samuelle, T. (2009). Mike Meyers CompTia Security+ Certification Passport. New York, NY McGraw Hill.Shim, S., Chae, M, Lee, B. (2013). Empirical analysis of risk-taking behavior in IT computer programme migration decisions. Computers in Human Behavior,25(6), 1290-1305. Retrieved from Science Direct Database on 20 October 2014.Sullivan, J., Beach, R. (2012), up project outcomes through operational reliability A conceptual model. global Journal of Project Management, 27(8), 765-775. Retrieved from Science Direct database on 20 October 2014.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment