logo

Information and Systems Security

   

Added on  2022-12-23

7 Pages1270 Words80 Views
Running head: INFORMATION AND SYSTEMS SECURITY
INFORMATION AND SYSTEMS SECURITY
Name of the Student
Name of the University
Author Note
Information and Systems Security_1
INFORMATION AND SYSTEMS SECURITY
1
Introduction
The NIDS or the network intrusion detection system is actually the method of the
security management of the network or system. An anti-threat programme or software are
installed in the system of a specific purpose. The outside and the network both are handled by
these techniques. The aim of the report is to explain the system properly with the required
key points with the given scenario properly. The system is used for the protection, all of the
faults, limitation, vulnerabilities and attack techniques also discussed properly (Javaid et
al.,2016).
Description
There are several points needed to discuss the network intrusion detection system
properly:
Limitation of network base defensive tools:
o In the network intrusion detection system, the packets can be handled through
the network. Then it can be said that the system will create a problem if the
attacker will send a malicious programme through the links. So it is one of the
biggest problems which can be said as a blind sensor. The next problem is the
administrator has to check the proper attack between a large number of
simultaneous attacks. It will accrue huge amount of space. The solution is to
use the N-Map procedure to decoy it. The nature of the detection which is
used in network intrusion system is one of the disadvantages of the network
problems (Hodo et al.,2016). Dental of service is used to complete this process
if the attacker chose the network host properly; then the NIDS may crash
(attack type is TCP/IP stack attack).
Techniques of system vulnerabilities:
Information and Systems Security_2
INFORMATION AND SYSTEMS SECURITY
2
o There are several techniques needed to discuss: Privilege Elevation: In this
type of attack, the hacker will try to take the privilege for the higher level in
the target system. After that the hacker will send the code for the entire system
attack. SQL injection: Malicious SQL codes are sent to the targeted server
account. After that the web application used to hack the system. Unauthorized
Data Access: In a specific application, this unauthorised attack has been done.
If the attack will be placed successfully then data fetching, client
authentication hacking and data monitoring access can be done by the hackers
(Sahita 2016). URL manipulation: It has been done through URL query attack.
The client server information may be licked through this. DATA
Manipulation: The hacker will use the HTML page for this procedure. Then
the data of the target account may be changed by the hacker and it will create a
headache of the website owner (Aljawarneh, Aldwairi and Yassein 2018).
Vulnerabilities in attacking tools:
Several tools are used in these cases. Those main tools are Hacker-combat
Network security scanner: It is a cloud based network security tools used to
prevent the virus as well as the malware.
1. OpenVas: It is one of the vulnerability scanner tools. The framework is
one of the powerful framework scanning tools which will use for the
management solution.
2. Nexpose Community: It is used in small organizations. It is a free and
single used vulnerable tool. The operating system, network and the web
database are managed by this software properly.
3. Nikto: It is one of the popular web scanners. Web server, virtual host and
the web sites are managed by the Nikto properly. Tripwire IP260: It is
Information and Systems Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Evaluation for WidgetsInc Web-Store
|11
|4054
|388

Contemporary World Application 2022
|10
|541
|10

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

Ethical Hacking and Defence - TCP Port Scanning with Nmap
|14
|3439
|108

Intrusion Detection System PDF
|6
|966
|48

Network Security Tools Report
|7
|1141
|38