Sunday, March 22, 2020

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

The three fundamental concepts of security are availability, integrity, and confidentiality. These concepts are commonly referred to as CIA or AIC triad which form the main role of any security program.Advertising We will write a custom essay sample on Identifying Potential Malicious Attacks, Threats, and Vulnerabilities specifically for you for only $16.05 $11/page Learn More Confidentiality prevents unauthorized disclosure of company’s data and ensures secrecy of the company’s data and information. Confidentiality should be maintained at all times while data is within the company’s network or during transmission through the network to its destination (Parikka 2007). Threat sources associated with confidentiality include network Monitoring, monitoring key strokes or screen, stealing of password files, social engineering. Countermeasures are encrypting data during storage and transmission by using network padding, employing strict ac cess control mechanisms and data classification, training personnel on proper procedures. Associated threat sources include viruses, logic bombs and backdoors. Countermeasures include strict access control, intrusion detection and hashing. Availability ensures reliability and accessibility to data and resources to authorized individuals, malicious attacks and threats. There is a set of mechanisms used by firewalls to protect networks from unauthorized access and allowing access to the authorized once. Below is a figure of a firewall.Advertising Looking for essay on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More The company has two working firewalls, threats associated with firewalls, as software, include penetration, i.e. hackers being able to get into the companies machines (Ludwig 1996). This may be a result of a misuse of the software (Firewall) where the firewall is configured or modified by a person who doesn†™t understand internet security or it is turned off. As a result of malfunctioning of the firewall viruses, trojan horses, or worms, may gain access to the network causing serious damage or loss of data and information. In addition, computers may also be destroyed in case of such attacks. Firewall may also develop bugs and flaws leading to its malfunction. Unauthorized deletion is yet another threat to the company’s network as there will be no control of access. It is thus very important that we ensure firewalls of the company are well configured and updated often. Windows 2008 Active Directory Domain Controllers (DC) – These are servers that control access to the network resources. Domain controllers work with computers with Windows NT Operating system. The company has two DC. One is the main or primary DC that controls access to the network resource and the secondary DC which acts as a reserve just incase the primary DC fails or assists the Primary DC when busy e.g . during heavy network traffic. The main threat associated with DC is Password cracking by hackers (Ludwig 1993). A hacker is any unauthorized person trying or having gained an access to the network resources.Advertising We will write a custom essay sample on Identifying Potential Malicious Attacks, Threats, and Vulnerabilities specifically for you for only $16.05 $11/page Learn More Hacking in to the company’s network can be prevented by changing of passwords often, using strong passwords that are not easy to guess and lastly by ensuring that the company hires employees that are loyal and can’t disclose passwords to strangers. Web / FTP server – This is an application (.html) running the File Transfer Protocol. FTP is the protocol in which files are transferred through the internet, it also provides file security. These threats can be prevented by proper configuration of routers and the IP protocol and by ensuring that the company has a secure Sockets Layer (SSL) which is a protocol that ensures secure transfer of data between Web browsers and Web servers. File server – This is a computer on a network responsible for providing a location for a shared file access or shared disk access, i.e. shared storage of computer files e.g. photographs, movies, documents etc. The three file servers in the company’s network face the likelihood of attacks from Viruses, Trojan horses or worms in case there is no firewall or it is malfunctioned, these elements may cause serious damage to the storage devices of the file servers, thus affecting shared disk access by other computers in the network. Exchange E-mail server – It works hand in hand with MS- Outlook. It enables users in a network to safely access communications like e-mail messages, instant messaging, and text messages from their devices such as desktops and mobile devices or Web browsers. Wireless access point (WAP) – Wireless application protocol is a secure specification providing instant communication access for users with wireless hand held devices such as mobile phones etc.Advertising Looking for essay on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More The company’s wireless access point (WAP) faces the threat of eavesdropping which may expose the company’s confidential data and / or information to unauthorized people. Eavesdropping can be prevented by encrypting data packets sent from one device to another. The company’s wireless access point (WAP) is vulnerable to attacks from viruses, Trojan horses or worms that may cause difficulty or lack of communication in the company leading to serious problems and loss. To prevent attacks to the company’s Wireless access point (WAP), the firewalls must be in good working condition at all times. Network Intrusion Detection System (NIDS) –This is a system that detects unauthorized access to the network. It does this by monitoring the network traffic for signs of malicious activities. The company’s NIDS faces threats, such as denial of service attack tools such as firewalls that can block the malicious elements, programs or persons trying to access t he company’s network and cause destruction to the computers, alter the organization of data files or cause loss of data files leading the company incurring huge losses. To prevent such attacks and threats security measure needs to be put in place like ensuring that firewalls are installed and are working efficiently (Gunn 1984). Desktop / Laptop computers – A computer is an electronic device that accepts user’s data as input, processes it using special programs to more meaningful state that can be understood by the user as output called information. Computers face threats such as theft. This can be prevented by hiring guards and by ensuring that the computer rooms are burglar proofed. VoIP telephone system – VoIP stands for Voice over Internet Protocol. It is a digital telephone service that uses the public Internet and private backbones for call transport. VoIP calls can originate and terminate from regular telephones since support for the public switche d telephone network (PSTN) is also provided. Through VoIP telephone system the company faces the threat of eavesdropping which may expose the company’s confidential data and / or information to unauthorized people, resulting into exposure of confidential data to strangers (Hancock 1998). Eavesdropping can be prevented by encryption of data packets sent from one device to another. Proper implementation of security control should be put in place and adhered to for the company to be safe from the above attacks, threats, and vulnerabilities. These problems continue to make computer based operations difficult and unless proper measures are taken this problem will persist now and in the future. References Gunn, J.B. (1984). Use of virus functions to provide a virtual APL interpreter under user control. ACM SIGAPL APL Quote Quad archive (ACM New York, NY, USA), 14(4), 163–168. Hancock, B (1998). Steps to a Successful Creation of a Corporate Threat Management Plan. Computer Fr aud Security, (7), 16-18. Ludwig, M. (1993). Computer Viruses, Artificial Life and Evolution. Tucson, Arizona: American Eagle Publications, Inc. Ludwig, M. (1996). The Little Black Book of Computer Viruses. Tucson, Arizona: American Eagle Publications, Inc Parikka, J. (2007). Digital Contagions. A Media Archaeology of Computer Viruses. Digital Formations. New York: Peter Lang. This essay on Identifying Potential Malicious Attacks, Threats, and Vulnerabilities was written and submitted by user Kingston I. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Thursday, March 5, 2020

College Writing Essays - Dragon, Plinking, Colored Frog, Free Essays

College Writing Essays - Dragon, Plinking, Colored Frog, Free Essays College Writing Dr.Kissler Monday February 21 1998 As you are awakened by the shrill morning yelp of the local farmer?s rooster, you emerge from your hut in a small woodland village. The morning sun glistens slightly off the emerald green grass as the local villagers start about their work for the newly starting day. When you finally venture down the small wooden ladder that protrudes from your front porch, you take notice of the small brook that runs out toward the surrounding areas. Small children frolic around you gingerly like the wind blowing through the tall saw grass on a mid-western plain. All the while, the local merchants peddle their wares around to the local shoppers. As you look slightly to your left you notice a small group of people crowded around a merchants stand. The crowd grows larger and it draws your attention. When you finally get to the large group, which now resembles a group of bees buzzing and swarming around a beehive, you look in awe at the beautiful items the merchant has placed upon his table to draw the attention of the shoppers. Finally, as the crowd gets too suffocating for you, you head toward the small pond at the end of the townsquare that is the source of the tiny brook. As you plop down on a weathered rock a minute, topaz colored frog hops next to you and stares at you with bulging eyes as if it was staring into the deepest part of your being. As quickly and swiftly as the miniscule frog appeared, a slight plinking sound is heard as you watch your amphibious friend dive into the crisp, sparkling water. Looking at the water whets your palette, you decide to take a drink from the water. The cold water cuts like a razor, but at the same time feels so refreshing. Suddenly, a dark shadow passes over the glowing afternoon sun. You gaze up and see a gigantic silver winged dragon sweeping across the landscape and casting what seems like an eternal darkness on the tiny wooded alcove that you call your home. You gaze in awe as the glimmering light of the sun slowly starts to illuminate the townsquare once again, while the great beast soars off to toward the rocky crags that lie in the west. The sheer monstrosity of the dragon flabbergasts little children, many of whom have never seen such an awe-inspiring spectacle in their young lives. While you sit there and listen to the young children spin yarns to their friends about the sighting of the dragon, it reminds of the old villagers who sit on the porch of the local ale hall and converse with locals and travelers about days of yore. Once again you notice the light in the square growing darker, but this time it is from nature and not a winged creature. You decide to head back to your house, looking forward to the nice long sleep that awaits you as you fall into your soft, supple bed.