Identifying Potential Malicious Attacks

Topics: Wi-Fi, Wireless access point, Wireless network Pages: 4 (1071 words) Published: December 10, 2012
Identifying Potential Malicious Attacks
Qazi Ali
Prof. Prem Jadhwani
CIS 333
November 6, 2012

The CIO Company will use firewalls, intrusion detection systems, virus scanners and other protective software to provide some assurance that the security policies for the site are properly implemented. Firewalls are the basis of computer and network security defense. They are widely deployed. They are very hard to configure properly, and people who configure them may not know the current threats and attacks. For example, an administrator maybe working on some task and might leave something open in a firewall where attackers can enter through. Some firewalls have the vulnerability that enables attackers and be defeated. By identifying the network components, you can evaluate their vulnerabilities. These vulnerabilities can have flaws in the technology, configuration, or security policy. Vulnerabilities can be fixed different ways, applying software patches, reconfiguring devices, or deploying countermeasures such as firewalls and antivirus software. Threat is when people take advantage of vulnerability and cause a negative impact on the network. If threat occurs it needs to be identified, and the associated vulnerabilities need to be addressed to minimize the risk.

As of today, most of the hackers are interested in hacking services such as HTTP (TCP Port 80) and HTTPS (TCP Port 443), which are open in many networks. By using access control devices, they can detect malicious exploits aimed at these services. Now these days applications has improve and very hard for hackers to get into but the technology need to stay up to date and be more intelligent. The attack methodology requires firewalls to provide not only access control and network protection, but also to understand application behavior to protect against attacks and hazards. Hackers’ always targeting applications and their goal is to get into one of these:  Denying service to legitimate users...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Identifying Potential Malicious Attacks Essay
  • Identifying Potential malicious Attacks Essay
  • Identifying Potential Risk, Response, Recovery Essay
  • Malicious Attacks Essay
  • Assignment 1 Malicious Attacks Threats And Vunerabilities Essay
  • Epidemiology: Identifying the Potential Spread of Infections Essay
  • The Attack Essay
  • Identifying Risks, Response, and Recovery Essay

Become a StudyMode Member

Sign Up - It's Free