logo

Network Security Threats and Recommendations

Identify and analyze threats to a company and design a secured network for an Australian advertising company, iCreative.

5 Pages1141 Words66 Views
   

Added on  2022-12-29

About This Document

This document discusses potential threats in network security, including client-side attacks and networking-based attacks. It provides recommendations to prevent these threats, such as keeping software up to date, installing web filtering software, and implementing user rights restrictions. Additionally, it explores the planning and design of network security technologies, including firewalls, honeypots, and routers.

Network Security Threats and Recommendations

Identify and analyze threats to a company and design a secured network for an Australian advertising company, iCreative.

   Added on 2022-12-29

ShareRelated Documents
Assignment 1
Network Security
Part I. Potential Threats
Threats
Complaints 1, 2 and 5 describe the client-side attack. Client applications are the target
vulnerabilities. The running slow and crashing of the computer is caused by the excessive
attacks through the use of the buffer overflow vulnerability. A compromised server is
invaded by a malicious application during their interaction. Data is stored in CPU, RAM,
memory and as a result the size of the buffer is exceeded. This leads to lack of space as
most of the computer resources are filled. Due to this, the computer easily gets crashed
and runs slow and low memory space is available.1
Complaints 3, 4, 6, 7 involve networking-based attacks that target the network. From the
description provided by the employees, it’s evident that there are too many data requests
in the remote server. Denial of service attack prevents the network from offering the
normal services. The attacks occur on the network bandwidth and connection spots. This
attack leads to malfunctioning of the website. Additionally, a drive-by download program
automatically downloads files to the users’ computers without authorization from the
user. This leads to a slow speed of downloading or accessing the network since the
network resources are used up.2
Recommendation
The common preventive measure is to always keep the company software up to date.
Installation of the web filtering software that keeps users from accessing sites infected by
drive-by download attacks.
Users’ rights restrictions can also be implemented in order to restrict the level of damage
in case a user accidentally downloads a malicious software.
1 Martial Carrie and James Wilshire, "Virtual extension of buffer to reduce buffer overflow
during tracing." U.S. Patent 8,612,650, issued December 17, 2013.
2 Rutvij Jhaveri, Sankita Patel and Devesh Jinwala, "DoS attacks in mobile ad hoc networks: A
survey." In 2012 second international conference on advanced computing & communication
technologies, pp. 535-541. IEEE, 2012.
Network Security Threats and Recommendations_1
Installation of a spam filter on the other hand can be use in detection of unwanted and
unverified emails and prevent entry to the user’s inbox.
Denial of service attack can be prevented by use of anti-spoofing. It verifies the accuracy
of the port, packet address and carry out reverse detection.
Part II. Firewall, Honeypot/s, and Other Network Security Technologies Planning and
Design for Brisbane Branch
1. Proposed secure network diagram
Figure 1. Brisbane branch Configuration
Network Security Threats and Recommendations_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
THE WEB SERVER VULNERABILITIES.
|7
|1313
|27

Home Network Vulnerabilities
|5
|858
|297

GNS3 Simulation - Networking
|9
|565
|52

Risks, Threats, and Vulnerabilities in Bank IT Infrastructure
|3
|803
|366

Network Design Proposal for XYZ Retails
|15
|873
|395

Prevention of DoS Attacks: Methods and Strategies
|12
|2585
|100