logo

Introduction to Information Assurance and Information Security Assignment 2022

4 Pages529 Words16 Views
   

Added on  2022-10-11

Introduction to Information Assurance and Information Security Assignment 2022

   Added on 2022-10-11

ShareRelated Documents
Running head: INFORMATION ASSURANCE AND INFORMATION SECURITY 1
Introduction to Information Assurance and Information Security
Student’s Name
Institutional Affiliation
Introduction to Information Assurance  and Information Security Assignment 2022_1
INFORMATION ASSURANCE AND INFORMATION SECURITY
2
Vulnerabilities related to TCP/IP
TCP/IP is faced by a number of vulnerabilities some these include TCP blind spoofing,
and SYN many among others.
TCP blind spoofing happens when the attacker manage to guess a sequence of a
continuing message as well as the port number of the message. Once they are successful at this
guest one is able to undertake an attack by introducing fraudulent information into the
communication sequence.
SYN flooding: In order to keep active communication the SYN and ACK fragments
requests that establish a TCP link between a client and the server is needed to respond. However
this condition is the where SYN flooding attack happens where several SYN packets are
deceived using a source address that is not genuine being send to the server and during
compulsion to respond the server sends out SYN-ACK packets to a non-existent address
(Vallone, Taylor, Venables, & Huang, 2018). This creates a flood of half-opened periods in
anticipation of responses that may never come, hence no new networks will be permitted by the
server and link from the genuine user shall be disregarded.
Countermeasures that address the vulnerabilities
TCP blind spoofing vulnerability is prevented by setting up an all-inclusive packet
filtering system, which analyzes and reject inbound data packets which have source addresses of
devices inside a specific network. For outgoing packets containing sender addresses to the
external network are also watched for and filtered.
SYN flooding vulnerability can be countered through use of anti-spoofing filtering on
network device. TCP system prediction attacks is affectively stopped by a firewall or router
Introduction to Information Assurance  and Information Security Assignment 2022_2

End of preview

Want to access all the pages? Upload your documents or become a member.