Preview

It255 Assignment 8

Good Essays
Open Document
Open Document
309 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It255 Assignment 8
The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.
We show how incremental deployment of such routers can make the Internet safer. Like all things dynamic, change is inevitable. Such is the case with your network environment. Upgrades and modifications to the network architecture can sometimes expose, or create security holes. Hardening a network does not always mean spending large amounts of money. Whether that means spending it on new hardware, software, or man hours really depends on what needs to be addressed. It may include all of the above. The time may come when a cost/benefit analysis will be required by those in charge before hardening activities can move forward. As such it's important to point out some of the non-technical benefits of network hardening for the business as a whole.
The more time you spend hardening your network, the safer it will be for not only your customers but your employees as well. Your Human Resources department will undoubtedly have confidential personal information on file for every employee. This could include social security numbers, information on dependents, emergency contacts, home addresses and telephone numbers, etc. That information will most likely be stored in an electronic format somewhere on your network. Keeping that information safe and secure from prying eyes should be a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT302 Assignment 5.1

    • 308 Words
    • 2 Pages

    Setting /etc/vsftpd/ftpusers lists users that are not allowed to log in on the FTP server…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    Defense in Depth provides the university several layers of protection. Starting at the endpoints, host intrusion protection (HIPS), should be installed on each Device. Properly installed, HIPS will not permit the installation of unauthorized programs. This was the root cause of the (D)DoS recently experienced. At the routers access control lists (ACLs) must be put in place to allow only traffic with a legitimate protocol and destination. Between the routers and the endpoint a firewall solution must be put in place. The firewall must be configured to allow only allowed protocols and port numbers to communicate with specific destinations. Between the firewall and endpoint a (D)DoS a detection tool (such as Arbor’s Prevail) must be put in place. This measure not only allows for quick detection of (D)DoS it also permits the automatic mitigation of the…

    • 569 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP route: One entry in an IP routing table that lists some potential destination (usually a network ID or subnet ID) as forwarding instructions, including the interface out which the router should forward the IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    One of the security options that we are going to use is Privacy or confidentiality. This will keep all information secret from all people unless you are authorized to see it. This will help with employee’s not finding things that they should not see like social security numbers, address, and sensitive documents for the company and so on. Having this as a security options is great. I would implement this on all of the networks that I would manage.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 assignment 1

    • 347 Words
    • 2 Pages

    IP Address – A 32-bit binary number, often written in the DDN format, that hosts use as their unique identifier in a TCP/IP network, much like a postal mailing address in the postal system.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 320 Words
    • 1 Page

    An important improvement that was added in Windows Vista was the removable media policies. It allowed for the use of USB drives, flash memory cards, external USB hard drives, and CD/DVD writers. These however posed a huge security problem for companies because it allowed the users to easily copy data from their systems, or even place unwanted viruses or malware onto their network. This lead to a lot of companies removing or just destroying these devices so that they wouldn’t work on their workstations.…

    • 320 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Eo 13636 Summary

    • 334 Words
    • 2 Pages

    The EO 13636 despite its early criticisms has accomplished a lot over the past two years considering the monumental task it was designed to undertake. The criticism that mandated solutions will inevitably be too slow to effectively respond is still true, but as the EO gains ground with the cooperation of private industry by sharing information to help coordinate efforts to enhance cybersecurity and providing liability protection, it seems that a mass solution is taking shape. One can only imagine how long it will actually take and how well it will be able to be managed and regulated. But one also hopes that a serious attack to our infrastructure does not take place before we at least get something in place that is flexible and can be improved…

    • 334 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    AIA105 Assignment Two

    • 1496 Words
    • 4 Pages

    If we attempt to define slaves or slavery we would conjure up notions of force, control, physical and psychological punishments brought on by a person or persons of higher authority. They are looked at and labelled as humans that are not worthy to be at the level of which their “masters” contain, thus the capability to provide physical force, poor nutrition and physical health and to justify it. Associating this stereotype of slavery to that of the convicts transported to Australia between 1788 and 1850, we could find many similarities. The past lives each individual lead, whether it be as a slave or a convict, can initially be perceived as degrading and a slow progress of deterioration of the mind and body. Once researching and finding more on each of the topics I was able to gain a clearer understand of both, enabling great comparison and debate.…

    • 1496 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 293 Words
    • 1 Page

    When doing the interview with a peer, I decided to interview a friend of mine who is a professional snake breeder. With this, came many difficulties. We were unable to do an interview face to face because of location, namely me being in South Georgia and him being in New Jersey. We decided to text, resulting in a little bit of confusion because he has a tendency to send long messages, which his phone will break up into separate messages, and my phone will get them out of order so I am trying to figure out what he is sending me, all while he is still sending me more.…

    • 293 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    iLab 6

    • 403 Words
    • 2 Pages

    What are the three primary methods for implementing security on this network, as well as the…

    • 403 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Assignment 2343

    • 759 Words
    • 4 Pages

    “Tears streamed down my face as God had provided solid confirmation that believing in Jesus was the most Jewish thing that I could ever do.” ~Lev Leigh, Messianic Jewish convert (p.65)…

    • 759 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Its 405 Module 3

    • 1571 Words
    • 7 Pages

    Most industries rely on the Internet and have seen significant gains in production and operations from this technology. Suppliers, customers, vendors, etc. use the Internet for orders, supply tracking, etc. The internet now plays a crucial role in most companies operations. While IPv4 has worked well for us for many years, the problem now lies…

    • 1571 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    A Description of Computers

    • 1084 Words
    • 5 Pages

    Data Bit- each individual ‘1’ or ‘0’ is a bit-short for binary digit. Byte- 8 bits are a byte. Kilobyte-is 1000 bytes (1024) Megabyte-is 1,000,000 bytes Gigabyte-is 1,000,000,000 bytes…

    • 1084 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Introduction ...................................................................................................... 4 1.1 Concerns around the securit y of the Internet .......................................... 4 1.2. Short discussion about IP Routing ................................................................ 5 1.2 Research activities to improve IP routing security ......................................... 7 2. Short list of IP routing attack vectors .............................................................. 9 2.1. Malicious Route Injection .............................................................................. 9 2.2. Unallocated Route Injection .......................................................................... 9 2.3. TCP Resets ................................................................................................. 10 2.4. Resource Exhaustion .................................................................................. 10 3. Measures to further secure IP routing ........................................................... 11 3.1. Protecting Router Configurations ................................................................ 11 3.2. Generalized TTL Security Mechanism (GTSM) ........................................... 12 3.3. Filtering ....................................................................................................... 12 3.4. Access Control Lists (ACLs)........................................................................ 12 3.5. Digital Signatures ........................................................................................ 13 4. Conclusion ....................................................................................................... 13 5. References…

    • 5094 Words
    • 21 Pages
    Powerful Essays