StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Week 2 CYB632 - Assignment Example

Cite this document
Summary
Attackers may obtain sensitive information from the networks and may cause the network to be corrupted. One example of such attacks is IP…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Week 2 CYB632
Read Text Preview

Extract of sample "Week 2 CYB632"

Computer sciences and information technology Assignment Types of network attacks: IP Spoofing There are many different types of attacks that can be used by attackers to analyze networks and obtain information about that network. Attackers may obtain sensitive information from the networks and may cause the network to be corrupted. One example of such attacks is IP spoofing. In this type of attack, the attacker replaces the original IP address with a different address from another machine (Liska, 2003).

The attacker can then masquerade as a trusted host thereby gaining access to a network. There are two types of this attack. First, there is the IP spoofing used in Denial of Service attacks. In this case, the attacker sends a packet to a host with a forged IP address. The host then sends an acknowledgement waiting for the response. However, this response is never given and hence the unanswered queries accumulate in the buffer of the device being targeted. When many spoofed queries are sent, these results in the overflow of the buffer and the network device may crash (Liska, 2003).

Secondly, IP spoofing can also be used in man in the middle attacks. In this case, the attacker is able to intercept the traffic that is heading between two given devices on a network. This helps the attacker monitor network traffic and may gain access to sensitive information such as passwords and usernames. Unfortunately, it is usually difficult for users to know the traffic is being intercepted by the attacker since each packet is eventually forwarded to the desired destination. The best countermeasure that can be used to address IP spoofing is ingress filtering performed by routers.

In this case, the routers check that all the incoming packets are from legitimate sources or machines. If the router determines that the IP address on the packet is not in the address block the interface is connected to, then the packets are dropped. Importance of a pentest report A penetration testing report gives the results of a vulnerability assessment and the penetration test of a given system in an organization (Lee, 2009). This report also offers recommendations on how the risks identified can be mitigated.

A penetration test report is important to any organization or business. First, this report helps the organization enhance the security of its systems. In the modern world, the damage that can be caused by hackers can be extensive, and this may significantly affect the operations and survival of the organization (Lee, 2009). Therefore, the pentest report helps identify vulnerable areas within systems and provides guidelines for addressing them. This helps the organization avoid future loss of critical information to attackers and also avoid the crippling of its systems through attacks.

Furthermore, the need to have pentest reports has been enhanced by the fact that many businesses are basing their systems online and there is a general trend towards e-commerce. Security testing is thus very important. Secondly, a pentest report is important for the internal audit within an organization. The findings of this report help the internal auditors identify the most vulnerable areas within the organization and thus develop policies to reduce the level of penetration. This then helps the organization maintain effective security in all its systems and processes.

Finally, a pentest report helps an organization comply with the relevant legal requirements and laws such as the Sarbanes-Oxley law of the United States (Lee, 2009). In many countries, there are different legal requirements relating to security which organizations have to comply with. The results of a pentest report can help the organization evaluate whether or not it meets the requirements, and thereby put mechanisms in place to ensure full compliance. ReferencesLee, R (2009). Penetration Testing and its Growing Importance for Modern Businesses.

Research Paper . pp. 1-33. Retrieved from http://uwcisa.uwaterloo.ca/Biblio2/Year/2009/Richard_Lee.pdfLiska, A(2003). Network Security: Understanding Types of Attacks. In The Practice of Network Security: Deployment Strategies for Production Environments. Prentice Hall.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 2 CYB632 Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Week 2 CYB632 Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1649550-week-2-cyb632
(Week 2 CYB632 Assignment Example | Topics and Well Written Essays - 500 Words)
Week 2 CYB632 Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1649550-week-2-cyb632.
“Week 2 CYB632 Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1649550-week-2-cyb632.
  • Cited: 0 times

CHECK THESE SAMPLES OF Week 2 CYB632

Epidemiological Assessment: Genetics, Behavior, and Environment

The second phase is the Administrative and Policy Assessment week 2 There are three main kinds of data included within an epidemiological assessment.... There are three main kinds of data included within an epidemiological assessment.... These factors are genetics, behavior, and environment....
2 Pages (500 words) Essay

Analysis of Moving U.S. White-Collar Jobs Offshore Article

The author pointed out that whereas the trend before was for blue-collar jobs to be outsourced to other low-wage countries, nowadays even white-collar jobs Case week 2 Case week 2 Summary The article “Moving U.... White-Collar Jobs Offshore” is about the current trend among U....
2 Pages (500 words) Essay

Organization-Wide Performance Improvement System

For… This clinical decision support system ensures that the hospital staff members, patients and other individuals are equipped with the knowledge to provide proper week 2 week 2 In health care, an organization-wide performance improvement system is quite efficient and effective (U....
2 Pages (500 words) Essay

Urgent Issues in Cybercrime

It is a fundamental requirement that everyone gets to understand the risks associated with information flaws, so as to make informed decisions on how to secure information.... With the advancement of technology, there has been encroachment into private information through various… Several organisations have fought to get to mitigate this vice through various measures....
2 Pages (500 words) Assignment

Border Security in the USA

The proponent of the posted thought specifically explicated that border security means keeping illegal immigrants from coming to the United States undocumented.... This is an interesting point, because this is just part of the general essential points linked to understanding the… However, the author seems to have taken it literally, though I have not seen any mistake about it, but border security could mean more than the idea of understanding the physical boundary....
1 Pages (250 words) Essay

Week 2

What decides the profundity and degree of the exertion is this: how enormous is the extension and unpredictability of the project, and… The scale and multifaceted nature matter in light of the fact that by definition they build the chance for questions.... The scaling of risk appraisal and risk alleviation planning must be relying upon intricacy, size and sorts of project....
2 Pages (500 words) Research Paper

Week 2 - Leadership

One of the major lessons learnt about charismatic leaders is that they are inspirational.... Such leaders always tend to have a huge following because of their admirable traits.... hellip; cause they are self-aware and focused, they can be relied upon by the top management to spearhead to the prosperity of the organization in which they are entrusted with leadership....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us