Review article about network security

Assignment Help Software Engineering
Reference no: EM132272767

Need to review given article and give response with 2 references.

Network security is becoming more and more crucial as the size of data being exchanged on the internet increases. Anyone uses the internet is expecting their confidentiality, integrity, and authentication protected and secured.

I think the most accurate method to evaluate an organization's information security stance is to be able to observe how it holds up against an attack.

The best way to ensure the system is protected or secured is to by conducting penetration testing. Penetration testing is the most effective way to find out if the system is vulnerable to any attack or not and allow to patch the found vulnerabilities.

Passive reconnaissance is a way that allow a person to gain information about the targeted computers and networks without actively engaging or touching the system. For instance, a hacker who does not have information about the targeted company, passively, he/she can be as simple watching the building to identify the time the employees come/leave the building.

Passive reconnaissance is usually done using the search engines (google, yahoo, etc) to gather information about the targeted company. Some of the passive information gathering methods could be social engineering and dumpster diving (Walker, 2017). Furthermore, hackers want to know IP addresses, OS platforms, applications, patch level, advertised network ports, users, and any information that lead to exploitation. Unfortunately, there is a thin line between black hat and white hat hacking when ethical hacker conducting exploitation. Therefore, to stay out of trouble, the ethical hacker should follow certain framework for performing audit of an organization.

According Kruger, Nickolay & Gaycken, 2013, the ethical hacker must: Talk to the client, and discuss the needs to be addressed during testing Prepare and sign non-disclosure agreement (NDA) documents with the client.

Prepare a schedule for testing conduct the test Analyze the results of the testing, and prepare a report Present the final report to the client Ethical hackers should know the penalties of an unauthorized access to a system.

Moreover, no penetration testing should begin until a signed document giving to him/her that express permission to perform hacking on a company's system is received from the company.

For instance, the 2002 Cyber-Security Enhancement Act, mandates life sentences for hacker who "recklessly" endangers the lives of others. According to Grave, 2010 stated, " Malicious hackers who create a life- threatening situation by attacking computer networks for transportation systems, power companies, or other public services can be prosecuted under the 2002 Cyber-Security Enhancement Act."

A person should be brave and true to himself about conducting something beneficial to society and to himself, " All scripture is God-breathed and is useful for teaching, rebuking, correcting and training in righteousness, so that the servant of god may be thoroughly equipped for every good work."

Timothy 3:16-17. The scriptures instruct people to provide a good work ethically.

References Walker, M. (2017). CEH Certified Ethical Hacker All-in-one Exam Guide.

Third Edition. New York, NY: McGraw-Hill. Kruger, J., Nickolay, B.; & Gaycken, S. (2013). The secure information society: Ethical, legal and political challenges (1. Aufl.ed). London: New York, Springer. DOI: 10.1007/978-1-4471-4763-3. Graves, K. (2010). CEH Certified Ethical Hacker Study Guide. Indianapolis, Indiana: Wiley Publishing, Inc.

Verified Expert

The assignment needed us to review the article on network security. We have done the same in 300 words along with 2 references. Since it was a reflection, references were not needed in APA format.

Reference no: EM132272767

Questions Cloud

Discuss what wireless technologies you have used : Discuss what wireless technologies you have used. Do you have wireless networks at home? If so, what standards does it use?
Role in preventing cryptanalysis attacks against a network : Discuss how physical security can play a role in preventing cryptanalysis attacks against a network.
Discussion of advanced storage solutions : Discussion of advanced storage solutions: How have storage needs changed in recent years, and what are forecasts for the near future?
Explain the intelligence cycle as it is applicable : The intelligence cycle is defined as the process through which information in its raw form is transformed into a more valuable and finished.
Review article about network security : Need to review given article and give response with 2 references - Network security is becoming more and more crucial as the size of data being exchanged
Discuss treatment options including alternative treatments : Discuss treatment options, including medicines/alternative treatments. Explain the resources you would use if you or someone you knew had this type of cancer.
Create a list that contains the months of the year : What would the pusedocode look like for: "Create a list that contains the months of the year.
Write a simple javascript rock paper scissors game : Write a SIMPLE javascript rock paper scissors game giving the user the option of playing again.
Discuss issues of selecting advertising media : Discuss issues of selecting advertising media for the Mayhem campaign. How might this process differ from that of campaigns for other companies?

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd