0% found this document useful (0 votes)
84 views6 pages

Computer Network Security Threats & Defenses

This document discusses computer network security threats and defenses. It identifies several common threats to networks such as denial-of-service attacks, malware, phishing, eavesdropping, data breaches, weak access control, privilege abuse, and outdated software. Appropriate defenses are then proposed to address each threat, including firewalls, antivirus software, encryption, digital signatures, access control policies, user education, and keeping software updated. The document aims to help secure networks by identifying threats and matching them with effective security measures.

Uploaded by

Nining Arlian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views6 pages

Computer Network Security Threats & Defenses

This document discusses computer network security threats and defenses. It identifies several common threats to networks such as denial-of-service attacks, malware, phishing, eavesdropping, data breaches, weak access control, privilege abuse, and outdated software. Appropriate defenses are then proposed to address each threat, including firewalls, antivirus software, encryption, digital signatures, access control policies, user education, and keeping software updated. The document aims to help secure networks by identifying threats and matching them with effective security measures.

Uploaded by

Nining Arlian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Running head: COMPUTER SECURITY 1

IT Management

Student’s Name

Institutional Affiliation

Date
Task 1: [50 Marks]
In this task, identify and discuss the different types of threat to which your network is
exposed to and your report should contain threats that can attack only computer
networks.
• Denial-of-Service (DOS) attack- A DOS attack on a computer network occurs

when a device or a network's functionality is prevented and cannot be accessed by the

users. It happens when the system is compromised by a third party sending high

capacity traffic to the device to make it flooded hence stop working.

• Distributed denial of service (D-DOS) attack- This attack is almost similar to DOS

attack in that the services are made inaccessible in the network by sending traffic

(Peterson, 2007). In D-DOS however, the traffic is generated from a group of devices

which causes an indirect path making it not to be traced easily.

• Malicious software (malware)- This is any program or software created and

targeted to damage or disrupt a computer network. It includes viruses, spam, Trojan,

spyware, rootkit, and worm.

1. Viruses- A virus is any malicious program generated to spread itself in a network,

infiltrate files and corrupt data.

2. Worm- This is a programmed attack that is intended to take advantage of security

failures and replicate itself without a host. It causes harm to the computer network by

consuming its bandwidth.

3. Spyware- Spyware often come with downloaded software and is made to monitor

and record information on users without their knowledge.

4. Trojan- Trojan is a malicious program which does not seem like a threat but when

installed could be malicious in spreading other malware such as virus and worm.
5. Rootkit- It is programmed to be invisible and can obtain administrators access via

the installation of additional software and is hard to remove it once installed. It gives

other malware, and unauthorized users access to the system (Hutchins, 2011).

• Phishing- This is a social engineering attack which usually is associated with the

email or instant messaging. It can get into a system through email alerts which appear

genuine and then makes an attempt on the user to provide information such as pins,

username and credit card information.

• Eavesdropping- This refers to the secret and unauthorized monitoring of

communications belonging to other people or organizations. It involves tapping of

small packets from networks and checking the data content for information. This

attack does not require any encryption service; this makes it so effective.

• Data breaches- A data breach occurs in the event of the information belonging to a

user in a network getting stolen, accessed or used by an unidentified person who is not

authorized to access the data. This is often caused by hacking into the net.

• Weak access control- It means that the ability of the system to govern what

authorized users access is compromised and authentication, accounting, and

authorization security are damaged. An attacker may view, change or delete content

or take over the administration.

• Privilege abuse- This is a deliberate threat to the network by people granted access

to the resources of an organization. They can alter data to satisfy their needs or

damage the organization.

• Software vulnerabilities- A user may not update the security of a system hence

posing threat to the network. Outdated software could slow down the entire network

causing the site to crash.


• Employees- The employees could pose a threat to the network security by lacking

the necessary education for the protection of the company's network system.

Task 2: [50 Marks]


In this task, identify and discuss the different types of defense to secure your network
and specify which defense is suitable for every threat mentioned in Task1 (Pearce,
2013).
• Use of firewall- This is a network security system used to observe and control all

the traffic entering and leaving a network. It blocks unauthorized users from getting to

the net by establishing a barrier between the internet and the system. This defense

mechanism can be used to prevent DOS and D-DOS attack.

• Use of antivirus software- This is a computer program for scanning, detecting and

removing malware from a computer. Different products of antivirus software exist

and can be used to protect against computer virus, Trojan horses, rootkits, worms,

spam, phishing and botnet DDOS attacks. Antivirus software can be purchased and

need to be updated regularly to bring efficiency. Updating software regularly helps to

protect against the threat of software vulnerability.

• Encryption- This is a process in which data is encoded to ensure that only specific

computer system can access it. It helps to deny access to unauthorized users who lack

the key to decrypt the data. This is used to protect against eavesdropping and data

breaches.

• Digital signature- This is a pattern to ensure that there is an authenticity of all the

electronic documents getting to the network. This includes e-mails, text files, and

materials. It provides the authenticity and integrity of the message received. This

protects against phishing.


• Digital certificate- It is a document that in the computer of the receiver that proves

the authenticity of the user sending a message. The certificate authority is a third party

providing digital certificates for use by organizations. It is used to protect against

threats like phishing, data breaches, and eavesdropping.

• Performing a thorough background check before issuing privilege credentials and

conducting privilege user training to the individuals selected is essential to protect

against privilege abuse.

• Creating strong access control policies of confidentiality, accountability, and

integrity, and creating a good password system should help to protect against weak

access control.

• User education on how to best preserve the network system by equipping them

with all practices to observe when using the internet including the safety issues.

• Use of over-provisioning brute force defense to protect on DOS attack.

• Website certificates should be kept up to date to ensure the validity of websites to

protect these threats.


References

Peterson, L. L., & Davie, B. S. (2007). Computer networks: a systems approach.


Elsevier.

Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011). Intelligence-driven computer


network defense informed by analysis of adversary campaigns and intrusion kill
chains. Leading Issues in Information Warfare & Security Research, 1(1), 80.

Pearce, M., Zeadally, S., & Hunt, R. (2013). Virtualization: Issues, security threats,
and solutions. ACM Computing Surveys (CSUR), 45(2), 17.

You might also like