Describe how networks can be attacked

Assignment Help Other Subject
Reference no: EM132957328

LO 1.1 Describe how networks can be attacked

LO 2.1 Describe how networked systems can be protected

LO 2.2 Explain what an organisation can do to minimise security breaches in networked systems

You will probably be asked to put together a power point presentation/word document that covers the above. I''ll go into the unit content in a second but in general it needs to be set out in a way that we can easily pick out the evidence which addresses those outcomes. For example, I would start with a section called something like "Network Threats".

Then run through some different threats, as an example:

1. Type of Attack - Virus/Malware, DDoS, Phishing etc.

Description - Give a summary of what this is and some information about how this type of attack might take place, the source of the attack and the damage it could do/effect it will have

2. How to protect against this type of attack.

Mention any software/hardware that can be used to protect against it or minimise the effect of the attack

So you need to come up with a few different examples of the attacks and how to protect against it.

Here is the Unit Content (page 3 of the specification) which relates to the above:

(for 1.1)

Attacks: types eg denial of service, back door, spoofing, mathematical, brute force, software exploitation, viruses, rootkits, worms, Trojans, spyware, adware

Sources of attacks: internal eg disaffected staff; external eg via internet connections or through unsecured wireless access point, viruses introduced by email

(for 2.1)

Email systems: security features eg secure MIME, spam, hoaxing, relay agents

Wireless systems: security features eg site surveys, MAC association, WEP/WPA keys, TKIP

Networked devices: security features eg router, switch, wireless access point

Transmission media: issues eg use of shielding

Personal access control: devices eg biometrics, passwords, usernames, permissions, digital signatures

Security control at device level: access control eg protocols, log in, certificates

Encryption: eg encrypting files for confidentiality, encryption with application-specific tools, recovering encrypted data

Intrusion detection systems: devices eg firewalls, virus protection, spyware protection, file monitoring, folder monitoring, use of honeypots, alarms

You don''t need to mention everything pasted above, it is just to give you some ideas of what to talk about.

Pick some of the potential attacks/sources of attack from the 1.1 contents,

Then underneath that address the specific attack with something from the 2.1 contents.

For the second part of the presentation you are looking at the following outcome

2.2 Explain what an organisation can do to minimise security breaches in networked systems

Some people struggle to see the difference between this and 2.1.

2.1 is about addressing the specific attacks mentioned in 1.1. So quite technical.

2.2 is more about general good practice organisations can implements to minimise attacks. Notice the verb used is ''Explain'' so you need a little bit more than bullet points here.

You could think of 2.2 as being fairly non-technical as it covers things like monitoring entry to the building, disposing of sensitive info correctly, promoting awareness amongst staff etc.

I''m sure you have plenty of security related policies, training and practices you need to follow when you are at work so feel free to use examples if you like.

The unit content for this is:

Policies and procedures: monitoring; education and training; backup and recovery schemes; configuring and upgrading software; setting up file and folder permissions

User responsibilities: adherence to specific guidelines eg strength of password, installation of new software

Education of IT professionals: maintenance of skills; knowledge of exploits; application of updates and patches

Physical security of system: lock and key; logging of entry; secure room environments; authentication of individual

Risk assessment and reduction: potential risks; penetration testing; security audits

So the second part of the presentation based on the above should finish it off.

Have a look through that and let me know if you want me to go through any of the individual parts, discuss anything first, or for me to check any notes. If you think it all sounds ok then contact the assessor for a brief once your marking is up to date.

Section 01: Types of Network Attack (1.1) and How to Protect Against Them (2.1)

Section 02: Networked Systems Security for Organisations. (2.2)

A really good section to look at for this information is comptia 220-1002

Reference no: EM132957328

Questions Cloud

Compute the cost of carious components of jackson capital : Compute the cost of carious components of Jackson's capital structure. 100,000 bonds of sh 1000, 8% Irredeemable debentures.
How identify the total for income tax expense : How identify the total for income tax expense that would be reported in Statement of Profit or Loss and Other Comprehensive Income for the period 30 June 2021.
Discuss the conclusions that you can draw about just shoe : Discuss the conclusions that you can draw about Just Shoes's financial position and identify potential audit risks to be investigated.
How much should each product of inventory be impaired : On December 31, 2021, How much should each Product of inventory be impaired (written down) on a total basis (not per-unit)?
Describe how networks can be attacked : Describe how networks can be attacked and Describe how networked systems can be protected - Explain what an organisation can do to minimise security breaches
Calculate net cash provided or used by operating activities : Calculate the net cash provided or used by operating activities. Increase in merchandise inventory 3,950. Increase in accounts payable 8,050
Determine amount of deferred taxes that should be reported : Monty Corp. purchased depreciable assets costing $28,800. Determine amount of deferred taxes that should be reported in the SFP for each year from 2020 to 2024.
What net cash flows from investing activities for year were : What Net cash flows from investing activities for the year were? Increase in accounts receivable during the year 45,500. Purchase of land 120,000
Why do think google went on such a shopping spree : Why do you think Google went on such a shopping spree? What effects will these purchases have on Google's financial statements?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd