logo

Cyber Security - Assignment PDF

   

Added on  2021-10-26

8 Pages2242 Words71 Views
Running Head: CYBER SECURITY
Question and Answers of Cyber Security
Name of the student:
Name of the university:
Author note:
Cyber  Security -  Assignment PDF_1
CYBER SECURITY1
1. Analyse how Intrusion Detection System (IDS) can resolve security issues in a
computer network.
Intrusion Detection System is used to resolve computer network security issues. The
attackers mainly target independent platforms to perform network intrusions. The intrusion
detection system assess access patterns to the network by the intruders and detects their
behaviour. The system analyses and monitors the network so that it can detect any signs of
security issues. There are two types of intrusion detection technique that are used to detect
unusual activities in the network. They are host-based and network-based using source of data.
Host based intrusion detection system is developed on individual computer for detecting attacks
and network based IDS are developed on raw network data (Quinn & Nadeau, 2015).
Additionally, security violation can also be detected in information systems. It prevents
exploitation of protocol and software vulnerabilities by intruders. Intrusion Detection System
uses various classifiers to detect access patterns to the network.
2. Analyse and explain footprinting in network security.
Data of a specific network environment is accumulated with the help of footprinting. The
system vulnerabilities are revealed by the process of footprinting. The objective and location of
intrusion are determined at the beginning of the process. After that non-intrusive method is used
to gather information about the organisation. The attackers use various technologies and tools to
gather these information that proves to be helpful to hackers. The pre-attack phase is referred as
footprinting that is the stage before performing the actual attack. The tools that are used for
footprinting are traceroute, Nmap and nslookup. The techniques of footprinting that are used are
network queries, DNS queries, ping sweeps, port scanning, World Wide Web spidering and
network enumeration. Information about target system is gained by the hacker through this
Cyber  Security -  Assignment PDF_2
CYBER SECURITY2
process. Internet is surfed by the process of crawling to get information about target. Another
web application that is used to get information about target website is WHOIS.
3. Evaluate how different tools can be used for footprinting with examples.
The tools that are used for footprinting are Sam Spade, SuperScan, Nmap and TcpView.
DNS interrogation is done with the help of Sam Spade graphical tool. Sam Spade is a key
security tool that has the features like Advanced DNS, Zone transfer, Scan addresses, Crawl
Website and SMTP relay check. SuperScan tool is used to do TCP port scanning and IP address
scanning (Czyz et al., 2016). The tool can scan the selected ports as well as all ports. SuperScan
is a powerful and smart tool that is used for footprinting. Nmap tool offers the added advantage
of being used in both UNIX/Linux and Windows operating systems. OS identification and ping
sweeps can be done through this tool. Another free tool that is used in Windows to monitor all
open UDP and TCP ports on local computer is TcpView. TcpView is not regarded as Intrusion
Detection System however, gives a picture of all happenings in the computer ports and
automatically refreshes them. As a result the user can see all the happenings.
4. Explain the main function of a firewall in network security. Analyse different kinds
of firewall in brief.
The main function of firewall is to block traffic that is intended to particular IP addresses
and server ports. The untrusted traffic are kept away from reaching incoming ports by the use of
firewalls. The two network interfaces that are used in Firewall are one for external side and the
other for internal side. The unwanted traffic cannot pass from external side to the internal side of
firewall interface (Luizelli et al., 2015). The trusted traffic are used to transverse from the
external interface of the firewall to internal interface of the firewall. Firewall allows only those
Cyber  Security -  Assignment PDF_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Policy .
|11
|3019
|463

Ethical Hacking and Penetration Testing Discussion 2022
|5
|1232
|11

Cybersecurity: Footprinting, Scanning, Enumeration, and Obfuscation Tools
|11
|1105
|345

Identification of Threats using Nmap and Metasploit Network Security Tools
|9
|1788
|54

Network Vulnerability And Cyber Security
|15
|1453
|15

Assignment | Cyber Security
|23
|2174
|14