preview

Essay on IT Security

Best Essays

Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or network device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security patches, you can minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable troubleshooting tools, it can effectively remove the possibility of DoS attacks. Also, any firewall or security software should be configured to recognize and block these attempts if possible. Back door- In a back door attack, a hacker exploits a coded “opening” in an application that allows them …show more content…

TCP/IP hijacking- Through the use of IPSec or a similar encryption method, you can eliminate instances of TCP/IP hijacking on your network. This incident occurs when an unauthorized user has knowledge of a legitimate IP address on the network, performs a DoS attack to remove the connection, and the spoofs the known address as their own to establish connection with another authorized user on the network. Man-in-the-middle- The use of Public Key Infrastructure (PKI), verified by a Certificate Authority, can prevent the instance of Man-in-the-Middle (MITM) attacks. MITM attacks occur when unauthorized users eavesdrop on communications between authorized users via packet sniffing. This requires an authorized user to present a unique key that can be authenticated by another authorized user before the connection can occur. Replay- Timestamps or sequence numbers on packet transmission can eliminate replay attacks. Replay attacks occur when an unauthorized user intercepts transmissions between authorized users, and forwards the packets to the destination as if he were the original sender. DNS poisoning- This type of attack can be prevented by only updating DNS server entries by authenticated sources and by maintaining up-to-date DNS software. This attack occurs when an attacker updates an IP address entry in a DNS server

Get Access