Wednesday, July 24, 2019
Security sciences Assignment Example | Topics and Well Written Essays - 1250 words
Security sciences - Assignment Example With considerations on the encryptions and capability of the single web-based C&C server, the application could be effective to track the bots that are present in a Java PHP. The same server requires a design in that it is able to receive reports that come from the bots and ensure the provision of instructions to the bots such as sleep, spam, and scan. The bot application requires a designed that enables it to work effectively under Java with the capabilities to facilitate deployment on the Linux hosts and report to its respective C&C. An additional capability of the botnet application under Java is to sniff traffic that has significance to any internet hacker. Question 2 The Rootkit is in a design that conceals the presence of certain procedures from normal detection processes that permits the consistency within fortunate access to a computer. By the time one discovers the Rootkit attack, it is appropriate that he or she distinguishes the degree of the attack before clean up. One ha s to presume the cumulative network transactions all hosts in the network within the compromise timeframe. The best approach is to conduct a recovery and prevent any possible attacks in future. Question 3 The Man-in-the Middle is an attack that cuts off the communication present within two dissimilar systems. Through the application of diversified techniques, the attacker has the capability to separate the original TCP into two secondary connections. One of the connections is present between clients with the attacker, while the alternative connection exists with the server. The moment a TCP connection experiences any interruptions, the attacker is able to take the proxy position with the ability to read, insert, plus, modify information via the cut off communication. Question 4 A browser security is an application designed for web browsers to use in internet security for safeguarding of networked data. There are beaches of malware that have the ability to interrupt with the computer system as an individual browses the internet. Hackers with intentions to exploit the security for a browser often use JavaScript. The Browser security is responsible for preventions on security exploits that are majorly after advantage of a userââ¬â¢s vulnerability that is achievable through almost all browsers. Question 5 DLP stands for Data Loss Prevention that is useful in the assistance of an organization to develop a plan towards the transfer in both virtual and cloud environment. The Data Loss Prevention is effective in the provision of control with visibility in an organizationââ¬â¢s infrastructure. The Data Loss Prevention offers an organization the ability to enforce information control. This is evident through runtimes where the DLP implements are obligatory to enterprises and cloud suppliers alike to secure sensitive information within the virtual and cloud surrounding. Other necessary applications of the DLP include monitoring and verification of data within a com puter network. Question 6 I would consider the implementation of Snort given the fact that it is an open source network responsible for the security against intrusion detection systems. Most organizations are always at risk of intrusion with knowledge of employees accessing several websites that could provide access by hackers. Snort is essential since it comprises the reimbursement of signature, protocol, with anomaly-based inspections. Question 7 The SYN flood attack sends the TCP link requests quicker as
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.