Friday, May 31, 2019

Essay --

I am hired as an Information Security Engineer for a videogame development company. The organization electronic network organize is given in the diagram. I was notified that malicious activities are taking place in the network structure. They can effect protection of the intellectual property and super sensitive data maintained by the organization. I am assigned to resolve these issues that arise in the network structure. In this document I go out analyze and assess potential malicious accesss and threats that may be carried out against the network along with potential vulnerabilities that may exist in the documented network. in any case I will tell the potential impact of all malicious attacks & threats and identified vulnerabilities to the network and the organization. Malicious attacks and threats to network are attacks that can be through by exploiters and hackers to get into network and steal the network information. There are different types of malicious attacks. Pas sive attacks look for encrypted data and perform algorithms to decrypt. They can place the hole where encrypted data is being decrypted or look for clear passwords. In an active attack attacker bypasses or break into secured network. They can use viruses, trojan horse horses, stealers, exploits or bugs (1). They can penetrate the network system to steal data or to change data or to shut down the system. A distributed attack requires that the adversary inscribe code, such as a Trojan horse or back-door program, to a trusted component or software that will after be distributed to many other companies users Distribution attacks focus on the malicious modification of hardware or software at the factory or during distribution. These attacks introduce malicious code such as a bac... ...nd Routing protocols. Operating system weaknesses accepts operating system vulnerabilities like not updating the operating system. Configuration weaknesses include unsecured user accounts, System accounts with easily guessed passwords, Misconfigured Internet services, unsecured default settings of the software products, and misconfigured network equipments. Security Policy Weaknesses include lack of written credential policy, poorly chosen or default passwords, inadequate monitoring and auditing, unapproved applications installation (Rufi, 2007). Mail Servers are other targets in which hackers want to gain access to network resources. Companies that access e-mail from the Internet, especially, are potential targets (Rampat). Threats can be performed to the network when attackers take advantage of the vulnerabilities and it has a negative impact on the network.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.