Protect the system from these procedural attacks

Assignment Help Computer Network Security
Reference no: EM13885556 , Length:

Q To protect the system

The typical behaviours of Internet intruders include information gathering, target systems scanning, back-door opening and log-file clean-up. A system administrator needs to have the tools, knowledge and experience to protect the system from these procedural attacks. In this Discussion, you will analyse hacker behaviour.

For information on information gathering, you can use any information-gathering service like Metagoofil, FerretPRO or free tools from Dogpile (InfoSpace, 2014) to search IRC, Usenet, email and file databases. For information on target system scanning, you can use a resource like the Nmap.Org (n.d.) site, the Northwest Performance Software (2014) site, nbtstat in Win2K or the tools discussed in last week's project.

References:

InfoSpace. (2014) Dogpile [Online]. Available from: http://www.dogpile.com/ (Accessed: 3 August 2014).

Nmap.Org. (n.d.) Nmap security scanner [Online]. Available from: http://nmap.org/ (Accessed: 3 August 2014).

Northwest Performance Software. (2014) Networking software [Online]. Available from: http://nwpsw.com/ (Accessed: 3 August 2014).

To complete this Discussion:

Post: Summarise the procedures and tools hackers use for information gathering, target systems scanning, back-door opening and log-file clean-up. Alternatively, give an account of a hacker story from a technical perspective, including the tools employed.

Verified Expert

Reference no: EM13885556

Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conc

Case study - forced decryption ruled unconstitutional

Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal ac

Define security strategies of defense in layered security

You will define security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and

Which of risks gci faces are most significant to company

What measures would you propose to senior management to try to prevent a breach of data held by GCI? Your response should include recommendations for mitigating vulnerabilit

Describe the implementation of secure sockets layer

Describe the implementation of Secure Sockets Layer (SSL) in support of Hypertext Transfer Protocol Secure (HTTPS). Assess how you are assured that your browser is secure. D

Identify laws that would be effective to convict offenders

Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your

Overview of cybersecurity framework

Look at the overviews of CobIT, ISO 27001, and the NIST cybersecurity framework How are they similar - How are they different? Which would you feel is more effective if you

New technologies using sophisticated anti-copying measures

Which is more probably to be effective in protecting intellectual property in digital media like CDs and DVDs: tougher copyright laws or new technologies incorporating more

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd