StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Vulnerabilities: - Essay Example

Cite this document
Summary
This research will summarize 10 common network vulnerabilities into a table. This table will be divided into three columns. First column represents name of vulnerability, second column offers the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
Network Vulnerabilities:
Read Text Preview

Extract of sample "Network Vulnerabilities:"

NETWORK VULNERABILITIES Network Vulnerabilities Affiliation Introduction This paper presents an overview of some of the common network vulnerabilities. This research will summarize 10 common network vulnerabilities into a table. This table will be divided into three columns. First column represents name of vulnerability, second column offers the description of that vulnerability and last column outlines the solution for the issue.NoVulnerabilityDescriptionControl1USB thumb drivesUSB data travel drives are one of the main reasons of compromising the network security.

Most of people make use of them to copy their sensitive information from one system to another and use it in a wrong way.We can protect our system by changing the computers default setting for the auto-run system files policies.2Laptop and notebooksLaptops are portable, discreet comprise complete OS, and are able to operate by means of an internal battery and approach through a handy Ethernet port for tapping and intruding directly into a network.Here we can establish an encrypted file system for securing our sensitive computer data.

3Wireless access pointsWireless access points allow the users to get an instant connectivity by remaining inside the range of a network. In this scenario, Wireless attacks through war-drivers are widespread as well as are very harmful to the computers connected to the network.In order to deal with this situation we need to install system protection firewalls that can protect the system from outsiders’ attacks. In addition, we also need to apply an appropriate authentication system for system access.

4Miscellaneous USB devicesThese devices are not only used as data travel drives but they have also installed program that can access, copy and damage system data.In this scenario, we need to apply and enforce asset control policies around what devices are able to enter the environment as well as when they should be allowed.5Trojan humanSimilar to the Trojan horse attacks, the Trojan human approaches into a firm in form of some kind of disguise. He could be in company’s uniform or dressed similar to legitimate repairman.

The basic intention of these people is to get access to a number of pretty secure systems, networks and environments, and server rooms. They can copy and damage the business data.The company’s employees should be informed and reminded regarding approved 3rd parties. In addition, recognize the source by asking queries not formulating assumptions.6Optical mediaOptical media is also one of the basic reasons of creating security related problems. In this scenario people write or copy their data on some optical media like CD/DVD with un-authorized access to system.

This can create a lot of security related issues for the network.In order to deal with this situation, we can amend the system access policy by modifying the system optical media rights. In addition, we need to change the system’s default rights to stop un-authorized system access.7Hindsight is 20/20This type of attacks makes use of some advanced applications to constantly monitor network manager’s activities and working on the system. In this way they can note the keystrokes and other information on the system.

A network administrator should be aware and alert regarding this threat whenever working on personal and sensitive material. In addition, there is need to install some suitable anti-spy-ware application.8Smartphone and other digital devicesNowadays new technology based smart phones with 4G and WiFi technology can transfer and access system’s data and information.Here we need restrict the wireless media access and apply proper authentication system for the effective network management.9E-mail:Email is also one of the main security breaches that can be used for sending and receiving some illegal data files any time.

Hackers can use this technique to send a spyware program.In order to deal with this situation we need to be aware of unknown mails and do not open or download unknown attachments those can cause serious damage to system.10Switch FloodingIn this attack, an attacker is able to overflow switch’s address table by means of false media access control (MAC) addresses and make the switch similar to a hub, which can transmit packets to all the devices connected to a network.We can deal with this problem by implementing an authenticated access to system for protecting overall system working and operations.

BibliographyManky, D. (2010, November 08). Top 10 vulnerabilities inside the network . Retrieved July 06, 2011, from NetworkWorld.com: http://www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html?page=4RedSeal Systems, Inc. (2011). How to Identify Your Most Urgent Security Network Vulnerabilities and Move Beyond a Host Centric Approach to Remediation. Retrieved July 08, 2011, from http://www.infosecurityproductsguide.com/technology/2008/RedSeal.htmlShelly, Cashman, & Vermaat. (2005). Discovering Computers 2005.

Boston: Thomson Course Technology.SlideShare. (2010). Ch04 Network Vulnerabilities and Attacks. Retrieved July 07, 2011, from http://www.slideshare.net/itsec/ch04-network-vulnerabilities-and-attacks

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Vulnerabilities: Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Network Vulnerabilities: Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1578090-network-vulnerabilities
(Network Vulnerabilities: Essay Example | Topics and Well Written Essays - 500 Words)
Network Vulnerabilities: Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1578090-network-vulnerabilities.
“Network Vulnerabilities: Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1578090-network-vulnerabilities.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Vulnerabilities:

Subordinate Communication in the Age of Informational Technology

It involves the implementation of multiple levels of data securitization, seeking to protect information from both unauthorized physical and network access and attack.... The current assignment presents four particular memo letters aimed to illustrate one's ability to maintain subornative communication within an organization....
8 Pages (2000 words) Assignment

SHORT written assignment

Hackers are people who use the system and Network Vulnerabilities to gain unauthorized… Hacking entails the use of various tools to perpetrate these acts of privacy invasion and sabotage that has significant and often disastrous outcomes for the victims.... Hackers are people who use the system and Network Vulnerabilities to gain unauthorized access to information and other related resources.... Viruses are specific pieces of software, command sequences and series of data that exploit a glitch, bug or vulnerability to propagate and proliferate in a computer, network or system (Furnell & Warren, 1999)....
1 Pages (250 words) Essay

The Solution of VPN Connection

Without a doubt, this can be problematic if an intruder has one privilege to accessing the network remotely, which allows him access to all the applications.... In this particular scenario, the frame relay network consists of a group of interconnected nodes (switches), which relay the frame relay data across the network.... Moreover, spoofing can also be conducted since an intruder can deceive the network that it recognizes a possible unauthorized access....
6 Pages (1500 words) Case Study

Rogue Access Point Network Security Paper

onsequently, the completion of this project is aimed at enabling the student to gain relevant practical knowledge on the aspects of network security requirements of an organization that are needed to harden the access points and prevent known Network Vulnerabilities.... nbsp; This implies that it is essential to determine the vulnerabilities that are associated with an organization's control system networks through the seeking of understanding into operations and communication types that could be concomitant to the system....
6 Pages (1500 words) Term Paper

Computer Technology and the Networked Organization

This essay articulates on network setup and design of a medium-sized food store, the structure of securing, socio-technical linkages and maintaining the network.... nbsp;… According to the paper the perfect network for medium-sized food store therefore must be candid and effortlessly controlled....  An Enterprise networks have thousands of end-users and comprises of wide-area network links, mainframe systems, complex array of servers and the like....
4 Pages (1000 words) Assignment

Professional Practice in Informational Technology Field

The author of this paper "Professional Practice in Informational Technology Field" examines the state of the IT industry and the learning requirements needed in the corporate world with reference to the role played by information technology systems.... hellip; By conducting an industry study regarding information management, it was observed that IT is an essential business input as well as a threat to corporate operations....
6 Pages (1500 words) Term Paper

Network Infrastructure and Security

However, the issue of Network Vulnerabilities can be recognized as a significant challenge for the company during the course of integrating virtualization and cloud technology.... Additionally, various factors are accountable for network infrastructure vulnerabilities that include password infringement, incorrect systems configuration, and attacks arising from malicious codes among others (Awodele et al.... n this regard, measures are required to be adopted with the aim of ascertaining that network infrastructure vulnerabilities arising in virtualization and cloud technology are mitigated....
5 Pages (1250 words) Essay

Strategic Network Management

It covers the vulnerabilities/risks of social networking that form its key issue of focus, the benefits, and how the risks can be controlled.... hellip; Online social networking presents various vulnerabilities and risks that require prudent mitigation despite its nobleness in steering performance.... The major vulnerabilities that hold the capacity of compromising performance include individual/institutional reputational damage, information leakage, malware attacks, and privacy breach among others....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us