New attack models
Course:- Computer Network Security
Length: 20
Reference No.:- EM13156

Assignment Help
Assignment Help >> Computer Network Security

The computer networks are based on free circulation of the information; they are built so to facilitate the users' access and to be very wide open to the information process. Attacks pose a serious security threat to a network environment. Once with the networks' connection to Internet or to other external computer networks, the aggression risks grow very much.

This paper constructed on the following bricks:-

1.      Abstract

2.      Introduction to New Attack Models

3.      What is an Attack?

4.      Purpose of launching attacks

5.      Types of Attacks

6.      Phishing

7.      Zombie computers and Bonnets

a.       Spyware

b.      Adware

c.       E- mail Spam

d.      Click Fraud

e.       Fast Flux

f.       Scare ware

8.      Cross Site Request Forgery

9.      Hardware Loss and Residual Data Fragments

10.  Application Layer Attack

a.       FTP related attacks

b.      SMTP related attacks

11.  Distributed Denial of service

a.       Bandwidth Depletion Attack

b.      Resource Depletion Attack

12.  Password Guessing Attacks

a.       Brute-force Attacks.

b.      Dictionary Attacks.

13.  Advanced Persistent Threats

14.  Unauthorized Access

a.       Internal Hacking

b.      External Hacking

15.  Viruses and Worms

16.  Trojan Horses

17.  Network Eavesdropping

18.  Prevention Methods

19.  Appendix

20.  References

In this paper we intend to present few types of network attacks which are common and pose a serious threat to the network systems along with certain measures or steps which should be necessarily taken in order to keep the networking computers secure from vulnerable attacks or intrusions and helps in securing the information.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Write a report discussing security vulnerabilities that can lead to the loss of confidentiality, integrity, availability, authenticity, or accountability using leading netwo
What is a buffer overflow attack, and what can be done to prevent them? Consider this question in terms of both the application and the hardware architecture/system itself.
Write a research paper about data encryption techniques. Your content should include the following: Business advantages and disadvantages of full disk encryption, compared to
Review the Fraud Risk Factors. Choose one (1) factor which you believe is the most important. Justify your response. Next, choose one (1) factor and determine two (2) polici
Write a 5-6-page research paper that discusses the possible role of encryption in preventing the breach described in the scenario. You may take either a pro or con position.
Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and ex
Assume your corporation is trying to decide whether it should buy special equipment to prepare some of its high-quality publications itself or lease the equipment from another
Explain your solutions for avoiding such attacks. Calculate the value of the symmetric key and the values of R1 and R2 in the Diffie-Helman Protocol for the set of given val