Review article about network security

Assignment Help Software Engineering
Reference no: EM132272767

Need to review given article and give response with 2 references.

Network security is becoming more and more crucial as the size of data being exchanged on the internet increases. Anyone uses the internet is expecting their confidentiality, integrity, and authentication protected and secured.

I think the most accurate method to evaluate an organization's information security stance is to be able to observe how it holds up against an attack.

The best way to ensure the system is protected or secured is to by conducting penetration testing. Penetration testing is the most effective way to find out if the system is vulnerable to any attack or not and allow to patch the found vulnerabilities.

Passive reconnaissance is a way that allow a person to gain information about the targeted computers and networks without actively engaging or touching the system. For instance, a hacker who does not have information about the targeted company, passively, he/she can be as simple watching the building to identify the time the employees come/leave the building.

Passive reconnaissance is usually done using the search engines (google, yahoo, etc) to gather information about the targeted company. Some of the passive information gathering methods could be social engineering and dumpster diving (Walker, 2017). Furthermore, hackers want to know IP addresses, OS platforms, applications, patch level, advertised network ports, users, and any information that lead to exploitation. Unfortunately, there is a thin line between black hat and white hat hacking when ethical hacker conducting exploitation. Therefore, to stay out of trouble, the ethical hacker should follow certain framework for performing audit of an organization.

According Kruger, Nickolay & Gaycken, 2013, the ethical hacker must: Talk to the client, and discuss the needs to be addressed during testing Prepare and sign non-disclosure agreement (NDA) documents with the client.

Prepare a schedule for testing conduct the test Analyze the results of the testing, and prepare a report Present the final report to the client Ethical hackers should know the penalties of an unauthorized access to a system.

Moreover, no penetration testing should begin until a signed document giving to him/her that express permission to perform hacking on a company's system is received from the company.

For instance, the 2002 Cyber-Security Enhancement Act, mandates life sentences for hacker who "recklessly" endangers the lives of others. According to Grave, 2010 stated, " Malicious hackers who create a life- threatening situation by attacking computer networks for transportation systems, power companies, or other public services can be prosecuted under the 2002 Cyber-Security Enhancement Act."

A person should be brave and true to himself about conducting something beneficial to society and to himself, " All scripture is God-breathed and is useful for teaching, rebuking, correcting and training in righteousness, so that the servant of god may be thoroughly equipped for every good work."

Timothy 3:16-17. The scriptures instruct people to provide a good work ethically.

References Walker, M. (2017). CEH Certified Ethical Hacker All-in-one Exam Guide.

Third Edition. New York, NY: McGraw-Hill. Kruger, J., Nickolay, B.; & Gaycken, S. (2013). The secure information society: Ethical, legal and political challenges (1. Aufl.ed). London: New York, Springer. DOI: 10.1007/978-1-4471-4763-3. Graves, K. (2010). CEH Certified Ethical Hacker Study Guide. Indianapolis, Indiana: Wiley Publishing, Inc.

Verified Expert

The assignment needed us to review the article on network security. We have done the same in 300 words along with 2 references. Since it was a reflection, references were not needed in APA format.

Reference no: EM132272767

Questions Cloud

Discuss what wireless technologies you have used : Discuss what wireless technologies you have used. Do you have wireless networks at home? If so, what standards does it use?
Role in preventing cryptanalysis attacks against a network : Discuss how physical security can play a role in preventing cryptanalysis attacks against a network.
Discussion of advanced storage solutions : Discussion of advanced storage solutions: How have storage needs changed in recent years, and what are forecasts for the near future?
Explain the intelligence cycle as it is applicable : The intelligence cycle is defined as the process through which information in its raw form is transformed into a more valuable and finished.
Review article about network security : Need to review given article and give response with 2 references - Network security is becoming more and more crucial as the size of data being exchanged
Discuss treatment options including alternative treatments : Discuss treatment options, including medicines/alternative treatments. Explain the resources you would use if you or someone you knew had this type of cancer.
Create a list that contains the months of the year : What would the pusedocode look like for: "Create a list that contains the months of the year.
Write a simple javascript rock paper scissors game : Write a SIMPLE javascript rock paper scissors game giving the user the option of playing again.
Discuss issues of selecting advertising media : Discuss issues of selecting advertising media for the Mayhem campaign. How might this process differ from that of campaigns for other companies?

Reviews

Write a Review

Software Engineering Questions & Answers

  Define how the project tasks will be tracked

Discuss any float built into the project, and justify your reasoning. Define how the project tasks will be tracked and how completion of tasks will be verified

  Calculating a discount that customers receive

Computing a discount that consumers receive based on the value of their order. If the total value ordered is less than $20, no discount will be given.

  List functional requirements and non-functional requirements

List two functional requirements (FRs). List two non-functional requirements (NFRs). List the actors of the WebApp. Draw a use case diagram for the

  Converse and contrapositive of the propositions

What are the converse and contrapositive of each of the propositions?

  Analyse how an it portfolio can help

Create an initial post in which you analyse how an IT portfolio can help add to the overall value being delivered to an organisation. In your analysis, address how an IT portfolio can reduce the proportion of the IT budget spent on maintenance.

  create a Z schema that adequately describes the WTC system

ITECH7410 Software Engineering Methodologies Assignment. You are to create a Z schema that adequately describes the WTC system

  Create flowchart to accept length of base of triangle

Create a flowchart that will accept the length of the base and height of a triangle and print the area. Area of a triangle is : area = 1/2b*h ; where b = base and h = height.

  Analysis and design of the friendbook website

Analysis and design of the "Friendbook" website, an online social network service - elaboration phase and the analysis and design steps of the construction phase and deliver artefacts which correspond to different stages of the Unified Process.

  Investigate and analyse the effect of applying cmmi practice

ITECH3501- 6501 Principles of Software Engineering:  Investigate and analyse the effect of applying CMMI practices/processes in an Agile environment in terms of business performance improvement and the limitations/restrictions of using both, and writ..

  Describe how the development-process framework provides

Describe how the development-process framework provides opportunities for streamlining software development, increasing quality, and minimizing risk. Explain the distinct focus areas that exist within system engineering and software development.

  Draw a use case diagram for the given scenario

List two functional requirements (FRs). List two non-functional requirements. List the actors of the WebApp. Draw a use case diagram for the given scenario.

  Explain the process for verification of system requirements

Explain the process for, and execute, verification of system requirements. Apply use case, data and process modelling techniques to specify system requirements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd