Identify different categories of network security attacks

Assignment Help Computer Network Security
Reference no: EM131047171

Security Attacks and their Solutions

Learning Outcomes: At the end of the project, students should be able:

- To learn and identify different categories of network security attacks in LAN and WAN environments.
- To apply specific security solutions for different types of attacks

Types of Attacks

1. DOS & DDOS attacks
- Consume host resources
- Consume bandwidth
- Crashing the victim
- Forcing more computation

2. TCP Layer attacks
- TCP Session Hijacking
- TCP SYN Flooding
- TCP Session Poisoning

3. Routing Attacks (IP Attacks)
- IP fragmentation attack
- IP address spoofing attack
- Traffic amplification attack

4. Application Layer attacks
- DNS spoofing (DNS Cache Poisoning)
- Applications & User authenticity attack
- Search engine poisoning attack

5. ICMP Protocol Attacks (Email attacks)
- No authentication
- ICMP redirect message
- ICMP destination unreachable
- ICMP echo request/reply

Individual Deliverables (Research & Documentation by individual members)

1. Select 1 of the type of attack given above and provide very specific and latest research based solution (countermeasure) for that type of attack and its sub categories.

2. Also justify your answer with practical solutions of the attack in any LAN or WAN network (draw diagrams where necessary).

Notes:

- All sections above should include proper evaluation of alternatives.
- An effort to ensure there is standardization must be indicated in all designs.
- Use appropriate diagrams wherever possible to illustrate your proposals.

Reference no: EM131047171

Questions Cloud

Introduction to business consulting : The following is a quote from the textbook "You can be very profitable and still go out of business".  Do you agree with this quote?  Why or why not?  Explain your answer.
How can your company profitably exploit this difference : How can your company profitably exploit this difference?
Complexity of global strategic planning : i) List and Explain the Five factors affecting the increasing complexity of global strategic planning. ii) What are the Control Problems of a Global Firm?
Select a funding agency and a funding instrument : An employer must select a funding agency and a funding instrument when a pension plan is established.a. What is a funding agency?
Identify different categories of network security attacks : Identify different categories of network security attacks in LAN and WAN environments - apply specific security solutions for different types of attacks
What are the main components of a cisco router : Refer to the exhibit below. The network administrator for a small advertising company has chosen to use 192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned to the company printer. However, ..
Trust in managing and leading in cuba : Write a 2-page paper analyzing and explaining the role of trust in managing and leading in Cuba. Include examples to illustrate your findings.
The maximum tax-deductible contribution brandon : Brandon, age 26, is a self-employed plumber. One month ago, Brandon hired his brother, age 20, to help in the business. Brandon wants to accumulate a retirement fund and decides to adopt a Keogh plan to fund his retirement. Brandon's net earnings ..
Comments about the troubles : Review this video by Microsoft's CEO of Global Strategy:  https://www.youtube.com/watch?v=Uu-Ol78lCi0.  Note the comments about the troubles Microsoft has had with emerging markets.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Most damaging corporate computer crime

1. In your opinion, what is the most damaging corporate computer crime today? In your reply provide at least two recent examples with references to support your opinion.

  Case study on byod

Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user's overall working experience.

  Sony reels from multiple hacker attacks

Sony Reels from Multiple Hacker Attacks on page 252 in the text and answer the questions below. APA formatting guidelines require a title page, abstract page, and reference page in addition to the body of the paper.

  Which type of computer crime describes actions

Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.

  Find a sample phishing email

Use Google to find a sample phishing email which there are many of on the Internet

  Implement the affine cipher in c programing language

Implement the Affine Cipher in C programing language with comments - Implement DES in C programming language with comments.

  Securing system using iptable firewall

You have to discuss the main use, limitations, and possible security holes of your firewall and write it in your report - discuss the advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your ..

  Describe how it applies to the realm of data communication

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Discuss the major networking building blocks

Discuss the major networking building blocks and their functions. Secondly, discuss software application's vulnerabilities, such as those found in web browsers.

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

  Web-based interface running on another server

Car Rental USA hired you as a consultant. They are building an in-house application system that will pull data from a database located on one server, and display it via a Web-based interface running on another server. What are security issues t..

  Genome4u is a scientific research project at a large

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases wit..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd