Sunday, February 10, 2019

Essay --

I am hired as an Information Security steer for a videogame development company. The organization intercommunicate structure is given in the diagram. I was notified that malicious activities are taking place in the meshwork structure. They underside effect protection of the intellectual property and highly cranky selective information maintained by the organization. I am assigned to patch up these issues that arise in the network structure. In this document I go away analyze and assess authorization malicious attacks and threats that may be carried forbidden against the network along with potential vulnerabilities that may exist in the attested network. Also I will tell the potential impact of each malicious attacks & threats and identified vulnerabilities to the network and the organization. Malicious attacks and threats to network are attacks that can be done by exploiters and hackers to get into network and steal the network information. There are different types of malicious attacks. Passive attacks look for encrypted info and perform algorithms to decrypt. They can enter the hole where encrypted data is being decrypted or look for clear passwords. In an active attack attacker bypasses or break into secured network. They can use viruses, Trojan horses, stealers, exploits or bugs (1). They can disseminate the network trunk to steal data or to change data or to shut down the system. A distributed attack requires that the adversary enfold code, such as a Trojan horse or back-door program, to a trusted component or software that will later be distributed to many other companies users Distribution attacks focus on the malicious registration of hardware or software at the factory or during distribution. These attacks uncover malicious code such as a bac... ...nd Routing protocols. Operating system weaknesses includes operating system vulnerabilities like not updating the operating system. pattern weaknesses include unbolted user acco unts, System accounts with easily guessed passwords, Misconfigured Internet services, unsecured default settings of the software products, and misconfigured network equipments. Security Policy Weaknesses include neediness of written security policy, poorly chosen or default passwords, light monitoring and auditing, unapproved applications installation (Rufi, 2007). Mail Servers are other targets in which hackers requirement to gain access to network resources. Companies that access e-mail from the Internet, especially, are potential targets (Rampat). Threats can be performed to the network when attackers take advantage of the vulnerabilities and it has a electronegative impact on the network.

No comments:

Post a Comment