This website uses cookies to ensure you have the best experience. Learn more

Roles Involved In Network Security Essay

430 words - 2 pages

Unit 9 Assignment 1: List phases of a computer Attack
Reconnaissance and Probing
The primary attach would be pretending to be friendly to a user by simply starting with a story or a joke to a co-worker, to get some type of information, then a search through different means (google, social sites, etc.)
Method of access
1. The primary target is to use some type of phishing, spear or pharming type of trick to get information (use a birthday, anniversary, etc.). I could pose as an outside contractor that just happen to have lost its private key accidentally and need to access the system through one of the company computers connected to the ...view middle of the document...

Then I could have gain access to the system.
Next phase of attack:
• Use hping/2 to test the firewall, hping offers an IP spoofing scan while monitoring a target’s response to seduce discovery information such as distinguishing between different firewall policies and active services.
• I would use Nessus Security Scanner with a tool providing a Scripting Language (NASL) to write a security test based on my findings on the weaknesses of my network.
• Another technique is the use of Nmap for scanning the network and single hosts. I would try the stealth ability of Nmap to bypass firewalls scanning all different protocols UDP, TCP, or ICMP. Ultimately the combination a set of tools would give me an idea about how a hacker can coordinate its intrusion to the network.
There is no way to see what is in the mind of a hacker, but with the use of tools SNMP, port-scanning, port mapping, Security probes, and others that can be customized, in reality a full set of security rules in place, proper computer training, strong passwords, and constant surveying, it is possible to prevent attacks. Establishing goals of defense in depth such as layers of security and detection, detecting flaws in each layer of security, and even if suspicion is detected find out where it found its vulnerability and make a careful planning to ensure its eradication by a number of defenses, application, operating system, network infrastructure, implementation of effective software practices.

Other assignments on Roles Involved In Network Security

Security Policy & Standard, Task 2

1741 words - 7 pages : Basic users, RAS users, Administrators, Executives, and Database Administrators roles, access levels, and responsibility should be defined. Facilities: HBWC headquarters in room 1234 & OGG offices in room 5678 (Location of servers and network devices) physical security must be examined. Technology: Microsoft Windows 95/NT Server environment, Access 97 database, and network devices and configuration of said equipment (Patches & Updates

Network Infrastructure Essay

5792 words - 24 pages SECURITY THREATS 50 IMPLEMENTATION OF CERTIFICATE SERVICES 51 IPSEC IMPLEMENTATION 56 References 62 INTRODUCTION This is a case study about a company called United Wholesale Scotland (UWS) based in Scotland with its head office in Edinburgh and two branches in Glasgow. The company is a distribution company that deals in locally produced household and groceries products, the main problems they are facing in their computer network is often

Lab Four

639 words - 3 pages available to the public. Unknowing users who connect to the Internet using these access points are then exposing their sensitive information to the hacker. To avoid being tricked by this set up, check to see if the login to a WiFi hotspot is SSL encrypted, and look for a valid security certificate. 4. Name at least three WLAN network devices commonly found in enterprise WLAN systems. NIC, Access Point, Wireless NIC 5. Name

File Management

654 words - 3 pages patient information to be indexed into our system. The doctors must be on the access control list in order to access our shared network drive. Being that I work in the Medical Records Department as a medical records technician and have to pull records from our network shared drive. Only four people within our department including myself have access to these files on a daily basis. This is due to security and confidentiality of all the patients

Information Systems Security

3283 words - 14 pages based on our current state. With that in my let’s introduce our infrastructure along with its many security features. The first domain that we will introduce is the user domain. The user domain defines the people who access our organization’s information system. Users within this domain assume certain roles that grant them access to systems, applications, and data depending upon their defined access rights. Note that our employees must conform

Ping Sweeps And Port Scans

562 words - 3 pages risks involved in having it. As administrators we might find ourselves needing these tools but end users do not need them therefore these tools should be only used on our LANs by administrators. References The University of Texas at Austin Applied Research Laboratories Defending yourself against port scanners Louise McKeag, TechWorld 14 April 2004

The Internet

989 words - 4 pages Theresa Jn. Baptiste - St. Lucia Managing Information Technology Security isn’t simply a technology issue, it’s a business issue. Discuss In any given organization information technology generally refers to laptop and desktop computers, servers, routers, and switches that form a computer network, although information technology also includes fax machines, phone and voice mail systems, cellular phones, and other electronic systems. A


847 words - 4 pages Outline network security measures needed in the design. This includes training, monitoring, and maintenance procedures. Provide implementation details of these measures. Justification Justify your determination that the network security measures are needed and will meet the business needs. Bibliography [1] No Author. (2015) Basketball Court [Online] Available:

Lan Lan Lan Aland

583 words - 3 pages LAN Operating Systems Scenarios Read the three scenarios below and answer the questions that follow each scenario. 1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to

Terracog Gps Case

4326 words - 18 pages attacker had several advantages, in that he was familiar with the PCS and had the necessary software to interact with the system. However, several PCS vulnerabilities contributed to the consequence. First, the system used inadequately protected wireless communication, thereby granting the attacker a network beachhead for his misbehavior. Furthermore, a system with effective security administration should have quickly disabled the credentials of

Is3230 Unit 2 Assignment 1

307 words - 2 pages Selecting Security Countermeasures IS3220 As a technology associate in the information system department at Corporation Tech I have reviewed the new network design and identified possible security threats and appropriated countermeasures. Entering the internet without proper security can be harmful in many ways. The first thing that should be added is a firewall. Firewalls can prevent unwanted traffic from infiltrating the network. This is

Similar Documents

Analysis 1 Email And Web Services

307 words - 2 pages amount of roles and features | Cloning | Performance tuning | Simplified maintenance | | | Lincensing | Reduced memory and disk requirement | | | | Reduced Risk Surface | | | | | | | | | | 2. In what environments is a Windows Server Core installation applicable? Do the security benefits a core server provides outweigh the inconvenience of a lack of Graphical User Interface (GUI) in most situations? * Active

Global Finance Essay

3346 words - 14 pages . Normally, network choices rely on the company budget, network coverage, and internal and external regulations. Effective network security requires constant upgrades and close monitoring to ensure possible loopholes are sealed in time. Executive Summery Global Finance, Inc. network is constructed by sets of routers and switches. The network switches and routers are designed with unique typologies including different sizes of meshes. The network

Chapter 1 Case Project 1 3 Essay

439 words - 2 pages a peer-to-peer network, all of the computers will have the same roles. No computer will have more authority over the others. At Thrift Towne, their workstations will be sufficient with the hardware that they came with. Since they would be using the workstations for inventory and schedules, there would be no need for any upgrades at this time. Chapter 1 Case Project 1-2 The network service I would recommend for Scoops would be management

Integrative Network Design Project Part 3

827 words - 4 pages threats. Another option is the use of Secure Socket Layer (SSL) which encrypts data packets before it is moved over the network rendering it unreadable if it should be intercepted. Other options that are available to protect the network would be the use of one-way hashing algorithms or transport layer security. The methods used for securing the network are often time determined by the type of network involved. In this section we will look at the