Sunday, January 5, 2020
Essay on IT Security - 3473 Words
Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or network device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security patches, you can minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable troubleshooting tools, it can effectively remove the possibility of DoS attacks. Also, any firewall or security software should be configured to recognize and block these attempts if possible. Back door- In a back door attack, a hacker exploits a coded ââ¬Å"openingâ⬠in an application that allows themâ⬠¦show more contentâ⬠¦TCP/IP hijacking- Through the use of IPSec or a similar encryption method, you can eliminate instances of TCP/IP hijacking on your network. This incident occurs when an unauthorized user has knowledge of a legitimate IP address on the network, performs a DoS attack to remove the connection, and the spoofs the known address as their own to establish connection with another authorized user on the network. Man-in-the-middle- The use of Public Key Infrastructure (PKI), verified by a Certificate Authority, can prevent the instance of Man-in-the-Middle (MITM) attacks. MITM attacks occur when unauthorized users eavesdrop on communications between authorized users via packet sniffing. This requires an authorized user to present a unique key that can be authenticated by another authorized user before the connection can occur. Replay- Timestamps or sequence numbers on packet transmission can eliminate replay attacks. Replay attacks occur when an unauthorized user intercepts transmissions between authorized users, and forwards the packets to the destination as if he were the original sender. DNS poisoning- This type of attack can be prevented by only updating DNS server entries by authenticated sources and by maintaining up-to-date DNS software. This attack occurs when an attacker updates an IP address entry in a DNS serverShow MoreRelatedSecurity, Security And Security1369 Words à |à 6 Pages1. Introduction While it is true that there are literally hundreds of Security Frameworks offering thousands of controls designed to help ensure that any particular network is compliant, most of these focus on compliance rather than security for known attack vectors. For instance, the National Institute of Standards and Technology (NIST) Security and Privacy Controls for Federal Information Systems and Organizations (NIST Special Publication 800-53 rev 4) offers 170 controls for covering variousRead MoreHuman Security And The Security Of A State962 Words à |à 4 Pagescomes to the security of a state, more traditional perspectives place security of the state above the security of its people. A direct opposition would be a less traditional perspective that the state should protect its most valuable asset, the people. Before comparing human security topics and traditional security topics, both must be explained because incorporation of human security to traditional security values causes mass tensi on. In the most basic of definitions, human security is keeping theRead MoreSecurity And Security : Security2171 Words à |à 9 Pages Security Perspective: Security is characterized as the situated of courses of action and innovations that permit the managers of assets in the framework to dependable control who can perform what activities on specific assets. The who refers to the people, pieces of software, and so on that form the set of actors in the system who have a security identity; security specialists ordinarily call such performing artists a principals. The assets are the parts of the framework considered sensitiveRead MoreCyber Security : Security And Security1880 Words à |à 8 PagesCYBER SECURITY: Cyber Security also called computer security and IT security, is the assurance of data from theft or any harm to the gadget, the product and information stored on hardware. It incorporates controlling physical access to the equipment and additionally ensuring against code or data injection or via network access. The field is of developing significance because of the expanding dependence of PC frameworks in most societies. Computer frameworks now incorporate a wide assortment of keenRead MoreSecurity Between Security And Security1938 Words à |à 8 PagesThat said, security sector actors cannot make accurate predictions about security given the degree of uncertainty associated with it, so they make assumptions about their expectations of security to allow them to rationalize their decisions. The most important assumption that states make is that security can be maximized. As discussed earlier, given the nature of known and unknown threats, it is impossible to accurately predict whether or not security is being provided at an optimal level. Not onlyRead MoreSecurity Is A Threat Of Security1493 Words à |à 6 PagesIntroduction: Security is a central concern in the study of international relations (IR). Yet despite being the focus of considerable scrutiny, few agreed conceptions of security exist (Buzan, 1991; Huysmans, 2006; Terriff et al., 1991; McSweeney, 1999; Morgan, 1992; Croft 2012; Smith 2000). Buzan even goes as far to posit that the very conception of security is ââ¬Å"essentially contestedâ⬠and thus poses an unsolvable debate (Buzan, People, states and fear; Little, ideology and change, p35). These disagreementsRead MoreSecurity Standards And Security Safety Standards812 Words à |à 4 PagesGovernment Security Standards The government and organizations are to comply with security laws and regulations in order to fully operate and maintain protection of information systems. Some of these security laws and regulations may vary for every industry and with some organizations; however, implementing security standards with a broad in scope provides reliable reasonable security. In many cases reasonable security implemented throughout the information system can include a high-level of protectionRead MoreInformation Security And The Security Essay1178 Words à |à 5 Pages While information security has many benefits in our technologically advancing environment, it also comes with its own set of issues. Three of the top issues in keeping information secure are lack of awareness, complacency, and no root cause analysis. Even more recently, we have experienced issues with information security and allegations of election hacking. Some of our biggest challenges come with keeping information secure in the business world. Auburn University researchers teamed up withRead MoreSecurity Problems : Security And Security1923 Words à |à 8 Pages ââ¬Æ' Abstract Security is beneficial to every company, spending nothing on security may save your business money in the short term but you only have to look back at the consequences Epsilon suffered due to lack of a quality security configuration making an estimated $4 billion loss due to negligence in their own network security system. Contents Abstract 1 Introduction 1 DBA 1 Security threats 2 Security breach examples 3 Security software 3 Security planning 3 Implementation 5 Authentication 5Read MoreTraditional Security vs Human Security1349 Words à |à 6 PagesTRADITIONAL SECURITY VS HUMAN SECURITY INTERNATIONAL RELATIONS INSTRUCTOR: SURAT HORACHAIKUL 12/13/2012 TRADITIONAL SECURITY VS HUMAN SECURITY 2012 Table of Contents 1. INTRODUCTION ..................................................................................................................................... 2 2. TRADITIONAL SECURITY VS HUMAN SECURITY .................................................................................... 3 2.1. TRADITIONAL SECURITY ........
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.