Tuesday, June 4, 2019

Types of Threats and Prevention in Networking

Types of Threats and Prevention in Ne cardinalrkingTASK 4TASK4 (1) Major types of threatsThere atomic number 18 bargain of threat in the networking or which squirt be the internal and external. Here I will explain both these threats below Internal ThreatUSB devices The biggest reason pop out of internal threat is USB devices according to star of the survey over 35% organizations believe that these devices were actually used for stealing or compromising the important information. lose of security agent Each organization has to install some agents on their endpoints. The work of these agents is to monitor the network traffic and various separate things. If these agents are out of date then our info is not fix. (cook, 2007)External threatPeer to peer sharing These programs are also responsible for stealing the data to the network. in addition with the peer to peer program, we can connect one device to another device and can check whole the data of another computer thingamabob on the loose One of the other reasons might be the when we lose our thing. If all the information is in that device so any(prenominal)body who found the device can stole the data easily.Malware This may also be the reason of external threat. As we probably know that malware comes from net profit from some bad sites, therefore if malware cypher in our device, then in some way they access or device.TASK 4 (B) Network security attacksNetwork security attack These are a couple of(prenominal) codes that can damage our codes as well steal the data as well. Some of the network threat is characterized below-DoS Its also cognize as denial of service assault. Basically form the name it is clear that it assault our system. Teardrop attack, Exploit limitations in the TCP/IP protocols are few of the DoS attacks. We can utilize programming to dispose of these DoS.DDos Distributed Denial of Service attack is an attempt to find the service unavailable by huge with traffic. It overtake it f rom so many sources. It always targets the essential resources from various important sites.Un original access Unauthorized access means it access the network or without any permission. That unauthorized person can steal or delete the data. In addition to that he can also misuse the information. Thats why we have to ontogeny the security.Data theft and loss Data theft is basic process of stealing the data. The stealing can be from the system or from the server where it is stored. To occurrent this we have to increase the security. physiologic attack Physical attack is in any physical form where the information can be damage. For instance, any subjective climates such as earthquake, flood or anything else. In addition to this it also cover any physical harm cause by the mankind manage whether the server is destroyed or something else.TASK 5TASK 5- Network threat mitigation techniquesFirewall Firewall is a network security system. It acts as a prohibition between networks. It sto ps the virus to enter in our device. So we can say that its a better way to secure our data. It only gives access to authorized sites.The standard specification of a firewall is listed below-Anti-spamAnti-virusAnti-spoofingAnti-phishingAnti-spywareDenial of service protectionThe other categories is end user keep in line featureUser based filtering individualist spam scoringPersonal allow and block listSimplified and centralized administrationMultilingual user interfaceBarracuda energizes updateLogs and graphic workNo per user chargesMultiple domain(Barracuda Spam Virus Firewall)IDPS ( invasion detection and prevention) It main work is to analyze the traffic for suspicious type of activities. Whenever there is something surprising it gives sign to the network administrator which can move to endThe standard specification of IDP is listed below-Frequency Required50/60 HzINTERFACE PROVIDEDTypeNetwork hostInterfaceEthernet 10Base-T/100Base-TX/1000Base-TConnector TypeRJ-45NETWORKINGFe aturesDiff Server support, DoS attack prevention, High Availability, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Quality of Service (QoS), built-in hardware bypassData Link ProtocolEthernet, Fast Ethernet, Gigabit EthernetPerformanceThroughput 300 MbpsRAMInstalled size of it(Juniper Networks IDP 250 security appliance)Anti-virus Anti-virus is the program which detect the virus and delete it. We can remove malware, including worms, spyware and adware with the help of anti-virus.The standard specification of Anti-virus is listed below-Stop unknown threats with sentimental intelligenceLayered protection with next generation technologiesSymantecs global intelligenceReduce bandwidth usagePatented real time cloudAccess delay This is the method which we utilize to manage the access of the user. Due to this we can create limit for the user, which is very helpful for the networking. There are two types of access control physical and logical.Standard specification The standard access controls the physical and the logical security as well.Simple to manage.Provide the best security.Physical security Physical security is the outside security which may help to keep the networking from the outside resources. It covers some of area, and very useful.Standard specificationStrong wallsStrong locksCCTVsSecurity harborStrong password Strong password protects our information from stealing. It can also protect our data from the hackers. A strong password contain varieties of thing comparable pattern, retina scan many of the things.Standard specificationPattern lockRetina scanVoice scannerFinger scannerTASK 6TASK 6- SCENARIOIn the above scenario there is discussion about the principle of information security between two companies AA and YY who are partner in the nuclear project. Before claiming anything clenched fist we have to study the basic principle of the information.Confidentially It basically refers to the privacy. It is design to check or save t he essential data from some of the participant and other persons. erstwhile(prenominal) in the big organizations if the data is very essential, then they provide the training to the person to make the information of confidentially stronger. More things which they add to make it more safe is to set the password. Because it will give the better security to the information.So basically if two or more organizations are working on the same project, then a one company cannot indicates the information without the agreement of the other companies.Availability Availability is called to give every significant thing which is essential for the project. For instance, if they need any other help then its duty to provide them these help. Like if two organizations are working on the similar project and one of the companies has availability of data which second company needed then it is responsible of the company to give that data to his partner, so they can complete their task easily. lawfulness I ntegrity is known as to provide the correct data, if it is coming from one person to another. To make it better we can use the encryption so data may not be lostTASK 7TASK 7- Role of cryptography in securing communicationCryptography is the term which we use to secure the data. It changes the message into an unreadable format and this message called the cipher text. Just the person who has the access to decrypt that message will able to read and understand the message. Sometime code breaking should be possible by some of the peoples.Nowadays, as all the major discussion occurs on the internet so the security of the internet communication is very important. For this reason the cryptography is used. It protects few things like credit card details and e-mails. It gives end to end encryption so if we are displace message over the internet to some person we can send it safely.TASK 8Task 8-Major types of cryptographyThere are three major cryptography schemes which are explained below-Sy mmetric cryptography A symmetric cryptography is that where both sender and user utilize the similar key for the encrypting and decrypting the message. It is the quicker cryptography as compare to another one, but each party have to swap the keys for decoding the message.Asymmetric cryptography Its called the public key cryptography. It utilizes two different keys to encrypt and decrypt the message which is known as public and private keys.Hash function It takes the set of the keys and maps to the value of certain length. It shows the original ecological succession of the character, while if it is smaller than the original.Whereas, we can say that it take message as the input and provide a fix size take out in the return. This string also called hash value, message digest, digital fingerprint.ReferencesBarracuda Spam Virus Firewall. (n.d.). Retrieved from firewallshop.com http//www.firewallshop.com/barracuda/spam-firewall.aspxCook, R. (2007, june 19). Securing the Endpoints The 1 0 Most Common Internal Security Threats. Retrieved from CIO http//www.cio.com/article/2438695/infrastructure/securing-the-endpointsthe-10-most-common-internal-security-threats.htmlgameboyrom. (2007, july 24). What is a local area network modem? Retrieved from DSL reports http//www.dslreports.com/faq/1669How to connect the word. (n.d.). Retrieved from whatlsmyIPaddress.com http//whatismyipaddress.com/natJuniper Networks IDP 250 security appliance. (n.d.). Retrieved from CNET https//www.cnet.com/products/juniper-networks-idp-250-security-appliance/specs/

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.