Thursday, May 16, 2019

Week 2 CYB632 Assignment Example | Topics and Well Written Essays - 500 words

Week 2 CYB632 - Assignment ExampleIn this case, the attacker sends a packet to a host with a forged IP promise. The host so sends an acknowledgement waiting for the response. However, this response is never given and hence the unanswered queries accumulate in the moderate of the device being targeted. When many spoofed queries atomic number 18 sent, these results in the overflow of the buffer and the network device whitethorn crash (Liska, 2003). Secondly, IP spoofing can also be used in man in the mall attacks. In this case, the attacker is able to intercept the traffic that is heading between two given devices on a network. This helps the attacker monitor network traffic and may gain access to sensitive teaching such as passwords and usernames. Unfortunately, it is usually difficult for users to know the traffic is being intercepted by the attacker since each packet is eventually forwarded to the desired destination. The best countermeasure that can be used to address IP spoo fing is submission filtering performed by routers. In this case, the routers check that all the incoming packets are from legitimate sources or machines. If the router determines that the IP address on the packet is not in the address block the interface is connected to, then the packets are dropped.A penetration testing report gives the results of a vulnerability assessment and the penetration test of a given system in an placement (Lee, 2009). This report also offers recommendations on how the risks identified can be mitigated. A penetration test report is important to any organization or business. First, this report helps the organization enhance the security of its systems. In the modern world, the damage that can be caused by hackers can be extensive, and this may significantly affect the operations and survival of the organization (Lee, 2009). Therefore, the pentest report helps identify vulnerable areas inwardly systems and provides guidelines for addressing them. This hel ps the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.