Preview

Network Vulnerabilities Paper

Good Essays
Open Document
Open Document
571 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Vulnerabilities Paper
Network Vulnerabilities & Solutions
Sec/280
January 19, 2013

This is my report on why I believe that it is important to protect our Windows and Unix/Linux servers from known vulnerabilities. As I am sure you know, there are many different types of attacks on servers/network systems today. Throughout this report, I will illustrate a few of the more recently known/discovered vulnerabilities on both the Windows and Unix/Linus servers.
First, I will start with a Windows vulnerability and it’s solution. The, “Windows file parsing vulnerability” is vulnerability within the windows file handling component. This particular vulnerability was discovered in certain windows that allowed remote code execution. This vulnerability could be exploited by creating a file or folder that is located on a local system, network share, or downloaded from an external source. If the attacker is successful, then exploitation of this vulnerability could result in them gaining the same privileges as one of our users. Depending on the privileges associated with the user, this attacker could install programs, view, change, delete data, or they could even create new accounts with full user rights. To protect our company from this threat I recommend that we apply all properly tested patches to our system and applications, deploy network intrusion systems, educate our employees to not open or download any suspicious attachments from untrusted users, and discourage our employees to not visit any links from suspicious sites.
Secondly, I will inform you about a Unix/Linux vulnerability and the approaches that we can take to help prevent exploitation. A, “System call entry point” vulnerability is potentially very harmful because it allows an attacker to take over a web server and gives them full root access to it. It does this by using backdoors. The major problem with this particular vulnerability is that it seems to have been exploited at a much



References: No author. (Dec. 2012). Retrieved from: http://www.cvedetails.com/cve/CVE-2012-4774/ No author. (July, 2012). Retrieved from: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3301

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows 2003 XP server?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    of the System/Application domain is loss of data. System/application attacks are generalized into three categories: denial or destruction, alteration,…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the workstation domain, we need to make sure that all workstations have antivirus and malware protection installed on them. Laptops and portable devices are very vulnerable to theft…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    Analyze a mixed-version Microsoft Windows environment and identify the issues described in Microsoft Security Advisories.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC362 Lab 4 Assessment

    • 412 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows 2003 XP server?…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    o Evaluate the pros and cons of building a custom Linux kernel and using a vendorsupplied…

    • 2958 Words
    • 12 Pages
    Satisfactory Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    7. Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microsoft Windows platforms, what would you do to identify known software vulnerabilities and exploits?…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In today society where almost everyone has access to technology, where the world is advancing in technology at a fast rate. The government that is also using technology to invade people specifically the Canadian Government.…

    • 502 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber crime paper

    • 1066 Words
    • 3 Pages

    The difference between cybercrime and traditional crime are: Cybercrime is a type of crime that not only destroys the security system of the county but also the financial system of individuals or businesses. Cybercrime is done by hackers that crack into computers and steal software, credit card information or bank account information. When cybercrime is involved, the ultimate goal for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make a profit. Hackers hate authority that stands in the way of their financial goals. The penalty for illegally accessing a computer system ranges from 6 months to 5 years or a fine. The penalty for computer hacking depends on many factors the age of the hacker, the system they hack into and the motivation for hacking into the system. Traditional crime on the other hand is a crime against public law. It is a physical hands on crime such as; rape, property crime; or committed with a weapon.…

    • 1066 Words
    • 3 Pages
    Good Essays