Investigating Network Security
VerifiedAdded on 2023/04/21
|20
|5617
|397
AI Summary
This study performs a critical assessment of different types of network vulnerabilities and underpinning flaws. It includes detection, mitigation, and countermeasures for attacks. The guide provides a step-by-step process to set up the system for the attacking scenario in the GH 5.53 forensic lab.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INVESTIGATING NETWORK SECURITY
Investigating Network Security
(GH 5.53 forensic lab)
Name of the student:
Name of the university:
Author Note
Investigating Network Security
(GH 5.53 forensic lab)
Name of the student:
Name of the university:
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INVESTIGATING NETWORK SECURITY
Executive summary
The following study performs a critical assessment of different type of network vulnerabilities and
underpinning flaws. This has involved detection, mitigation and counter measuring of those attacks.
After that, various process of detection, mitigation and counter measurements for various attacks are
also analyzed. The overall task is done within the scenario of virtual machine to avoid the effect of
actual systems. Furthermore, a guidance is provided to measure the network security attacks in the
context of GH 5.53 forensic laboratory. Lastly, a critical reflection is provided in the study on the
overall analysis done and various types of personal experience achieved.
Executive summary
The following study performs a critical assessment of different type of network vulnerabilities and
underpinning flaws. This has involved detection, mitigation and counter measuring of those attacks.
After that, various process of detection, mitigation and counter measurements for various attacks are
also analyzed. The overall task is done within the scenario of virtual machine to avoid the effect of
actual systems. Furthermore, a guidance is provided to measure the network security attacks in the
context of GH 5.53 forensic laboratory. Lastly, a critical reflection is provided in the study on the
overall analysis done and various types of personal experience achieved.
2INVESTIGATING NETWORK SECURITY
Table of Contents
1. Introduction:......................................................................................................................................3
2. Critical analysis of vulnerability and underpinning flaws:................................................................3
3. Guide for setting up system for the attacking scenario:..................................................................11
4. Critical reflection of the task done and personal development gained:...........................................14
5. Conclusion:......................................................................................................................................15
6. References:......................................................................................................................................16
Table of Contents
1. Introduction:......................................................................................................................................3
2. Critical analysis of vulnerability and underpinning flaws:................................................................3
3. Guide for setting up system for the attacking scenario:..................................................................11
4. Critical reflection of the task done and personal development gained:...........................................14
5. Conclusion:......................................................................................................................................15
6. References:......................................................................................................................................16
3INVESTIGATING NETWORK SECURITY
1. Introduction:
The network security is the system activity that is developed for protecting integrity and
usability of network. This also includes providing security to data. This includes various
technologies of software and hardware. It is useful to control the access to networks. This targets
various threats and the stop them to enter or spread then to individual network.
The software vulnerability refers to the defect or flaw in construction software. This is
exploited by attackers for obtaining privileges in the system. This also indicates the vulnerability
offering probable entry points for the system. In this study, the vulnerability present in the software
is examined. This software is been running on the network component and host-machine.
In this report a critical analysis for various vulnerabilities and underpinning flaws are
discusses. This also includes the detecting, mitigating and counter measuring for attacks. Next, a
step-by-step guidance to set up the system for this scenario of attack is investigated. This is done
under the environment of virtual machine for avoiding the impact of real systems. Here, the guide is
considered enough for reproducing the attack under the scenario of GH 5.53 forensic lab. At last, a
critical reflection is provided on the task done and different personal development gained.
2. Critical analysis of vulnerability and underpinning flaws:
It is seen that the present “state-of-the-art” of various network security appliances has been
undertaking huge job. This is to keep the cyber hackers away from invading the business. Various
vulnerabilities for the network security are demonstrated below. This also includes the underpinning
flaws. Besides, the ways to identify, mitigate and countermeasure are also provided hereafter.
1. Introduction:
The network security is the system activity that is developed for protecting integrity and
usability of network. This also includes providing security to data. This includes various
technologies of software and hardware. It is useful to control the access to networks. This targets
various threats and the stop them to enter or spread then to individual network.
The software vulnerability refers to the defect or flaw in construction software. This is
exploited by attackers for obtaining privileges in the system. This also indicates the vulnerability
offering probable entry points for the system. In this study, the vulnerability present in the software
is examined. This software is been running on the network component and host-machine.
In this report a critical analysis for various vulnerabilities and underpinning flaws are
discusses. This also includes the detecting, mitigating and counter measuring for attacks. Next, a
step-by-step guidance to set up the system for this scenario of attack is investigated. This is done
under the environment of virtual machine for avoiding the impact of real systems. Here, the guide is
considered enough for reproducing the attack under the scenario of GH 5.53 forensic lab. At last, a
critical reflection is provided on the task done and different personal development gained.
2. Critical analysis of vulnerability and underpinning flaws:
It is seen that the present “state-of-the-art” of various network security appliances has been
undertaking huge job. This is to keep the cyber hackers away from invading the business. Various
vulnerabilities for the network security are demonstrated below. This also includes the underpinning
flaws. Besides, the ways to identify, mitigate and countermeasure are also provided hereafter.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INVESTIGATING NETWORK SECURITY
USB thumb drives:
They is regarded as one of the popular processes. This can infect any kind of network from
within any type of firewall. The underpinning flaws include the facts that they are small, inexpensive
and holding lots of data (Pathan 2016). Further, they can be utilized between various types of
computers. Here, the ubiquity property of thumb drives is found to drive hackers for developing
targeted malware. This includes Conficker worm. They can automatically undertake establishment
of connecting with the live port of USB. Here, the worse thing is that there are configurations of
default operating system permitting maximum of the programs like malicious ones in running
automatically.
Ways of mitigation:
The default auto run policies of the computer must be modified. One can find data on the
ways to perform under the Windows scenario (FIRST — Forum of Incident Response and Security
Teams 2019). The CVSS or Common Vulnerability Scoring System providing the method to capture
the properties of vulnerability and create numerical score that reflects the severity and textual
representation.
Besides, CVE can be deployed which is a popular exposure and vulnerability identifies. It is
helpful to provide data exchanges such the services and products of cyber security is able to speak
with others (Nvd.nist.gov 2019).
Vulnerabilities in systems:
The laptops are portable, discreet and involved competing the operating systems. They are
able to operate through different internal battery. They have been coming with various handy
Ethernet port. This is to tap directly to network (Singhal and Ou 2017). Besides, the notebook might
USB thumb drives:
They is regarded as one of the popular processes. This can infect any kind of network from
within any type of firewall. The underpinning flaws include the facts that they are small, inexpensive
and holding lots of data (Pathan 2016). Further, they can be utilized between various types of
computers. Here, the ubiquity property of thumb drives is found to drive hackers for developing
targeted malware. This includes Conficker worm. They can automatically undertake establishment
of connecting with the live port of USB. Here, the worse thing is that there are configurations of
default operating system permitting maximum of the programs like malicious ones in running
automatically.
Ways of mitigation:
The default auto run policies of the computer must be modified. One can find data on the
ways to perform under the Windows scenario (FIRST — Forum of Incident Response and Security
Teams 2019). The CVSS or Common Vulnerability Scoring System providing the method to capture
the properties of vulnerability and create numerical score that reflects the severity and textual
representation.
Besides, CVE can be deployed which is a popular exposure and vulnerability identifies. It is
helpful to provide data exchanges such the services and products of cyber security is able to speak
with others (Nvd.nist.gov 2019).
Vulnerabilities in systems:
The laptops are portable, discreet and involved competing the operating systems. They are
able to operate through different internal battery. They have been coming with various handy
Ethernet port. This is to tap directly to network (Singhal and Ou 2017). Besides, the notebook might
5INVESTIGATING NETWORK SECURITY
contain malicious codes that has been found to be running in background. This is been tasked for
scouring the overall network and has been seeking extra systems that has been involved in infecting.
These can also belong to any type of internal employee or other outside guests. They are visiting and
has been the working for the business. Thus beyond the affected laptops consisting in internal
network, it has been vital to thing about the laptops. Here, the companies comprise of various types
of sensitive data. This cannot leave the walls of building absolutely. Examples of this include, social
security numbers, phone numbers, home address, medical records and salary information. This turns
to be harmful as the data is stored to unsecured portable computers (Zhou and Luo 2017). Moreover,
there are publicly disclosed examples of notebook for sensitive data that are found to be missing. Till
the laptop employs complex algorithm of encryption, the data can be recovered easily from any
specific file system.
Ways of mitigation:
Here, any encrypted file system must be implemented for the sensitive information. There
has been various solutions that are off-the-shelf. It has been present there for choosing. It has also
included the open source elements like TyrCrypt. Here, the endpoints must be controlled. This can
be entered or might exit the internal system which is vital. The various sensitive data like Wi-Fi, DV,
and VPN access has not been stored persistently over the devices.
Different wireless access points:
This Wireless APS has been supplying different immediate kind of connectivity to users.
This is under the proximity of network. Here, the attacks of wireless from, wardrives are common.
They have been causing notable damages. For example, it was seen that various popular businesses
has been attacked through this process. Here the intruders accessed the systems that has been
processing and storing different customer transactions. This include merchandise return transactions,
contain malicious codes that has been found to be running in background. This is been tasked for
scouring the overall network and has been seeking extra systems that has been involved in infecting.
These can also belong to any type of internal employee or other outside guests. They are visiting and
has been the working for the business. Thus beyond the affected laptops consisting in internal
network, it has been vital to thing about the laptops. Here, the companies comprise of various types
of sensitive data. This cannot leave the walls of building absolutely. Examples of this include, social
security numbers, phone numbers, home address, medical records and salary information. This turns
to be harmful as the data is stored to unsecured portable computers (Zhou and Luo 2017). Moreover,
there are publicly disclosed examples of notebook for sensitive data that are found to be missing. Till
the laptop employs complex algorithm of encryption, the data can be recovered easily from any
specific file system.
Ways of mitigation:
Here, any encrypted file system must be implemented for the sensitive information. There
has been various solutions that are off-the-shelf. It has been present there for choosing. It has also
included the open source elements like TyrCrypt. Here, the endpoints must be controlled. This can
be entered or might exit the internal system which is vital. The various sensitive data like Wi-Fi, DV,
and VPN access has not been stored persistently over the devices.
Different wireless access points:
This Wireless APS has been supplying different immediate kind of connectivity to users.
This is under the proximity of network. Here, the attacks of wireless from, wardrives are common.
They have been causing notable damages. For example, it was seen that various popular businesses
has been attacked through this process. Here the intruders accessed the systems that has been
processing and storing different customer transactions. This include merchandise return transactions,
6INVESTIGATING NETWORK SECURITY
check, debit card, credit cards and so on (Li et al. 2016). Moreover, it is also seen that the intrusion
has been costing more than 500 million dollars till date for many business. Hence, it can be said that
the Aps has been naturally insecure. This is regardless as the encryption has been used or not.
Moreover, the protocols like wireless encryption protocols has been containing various types of
known vulnerabilities. These has been simply compromised with various types o attack framework
such as Aircrack. Here, the more robust protons like WPA or “Wireless Protected Access” and
WPA2. It has been still prone to different types of dictionary attacks. These are as the strong keys
that are found to be not be utilized.
Ways of mitigation:
The WPA2 Enterprise that has been utilizing RADIUS is suggested here with the AP. This is
able to perform authentication and enforce the measures of security. Different mixed and strong
passwords must be utilized and changed on frequent basis. The wireless APs are been connected for
convenience. Hence this has been not needed to have them interconnected to the working scenario
(Sgora, Vergados and Chatzimisios 2016).
Vulnerability for USB devices:
Here, the thumb drives are not the devices that the information technology requires o be wary
of. Here, most of the devices are able to store data within common file systems. This could be
written and read through USB or same connection. And this is not the main activity of the devices
that are very often forgotten as the effective challenges. Here, the fact is that as the endpoint is able
to execute and read the data from the device, they can pose must of the threat as the thumb drive
(Durkota et al. 2015). Here, the devices involves digital picture frames, fax machines, scanners,
printers, AMP3 players and digital cameras. It was reported by Best Buy in 2008, that a virus is
check, debit card, credit cards and so on (Li et al. 2016). Moreover, it is also seen that the intrusion
has been costing more than 500 million dollars till date for many business. Hence, it can be said that
the Aps has been naturally insecure. This is regardless as the encryption has been used or not.
Moreover, the protocols like wireless encryption protocols has been containing various types of
known vulnerabilities. These has been simply compromised with various types o attack framework
such as Aircrack. Here, the more robust protons like WPA or “Wireless Protected Access” and
WPA2. It has been still prone to different types of dictionary attacks. These are as the strong keys
that are found to be not be utilized.
Ways of mitigation:
The WPA2 Enterprise that has been utilizing RADIUS is suggested here with the AP. This is
able to perform authentication and enforce the measures of security. Different mixed and strong
passwords must be utilized and changed on frequent basis. The wireless APs are been connected for
convenience. Hence this has been not needed to have them interconnected to the working scenario
(Sgora, Vergados and Chatzimisios 2016).
Vulnerability for USB devices:
Here, the thumb drives are not the devices that the information technology requires o be wary
of. Here, most of the devices are able to store data within common file systems. This could be
written and read through USB or same connection. And this is not the main activity of the devices
that are very often forgotten as the effective challenges. Here, the fact is that as the endpoint is able
to execute and read the data from the device, they can pose must of the threat as the thumb drive
(Durkota et al. 2015). Here, the devices involves digital picture frames, fax machines, scanners,
printers, AMP3 players and digital cameras. It was reported by Best Buy in 2008, that a virus is
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7INVESTIGATING NETWORK SECURITY
found within the picture frames of Insignia that were sold during Christmas. This has been coming
directly from various manufacturers.
Ways of mitigation:
Deploying and enforcing the resource policies and controls that the devices are able to enter
the environment and the time of entering. Next, a follow up must be taken from the frequent policy
reminders. The “department of defence” in 2008, has created policies and then banned USB and
various additional removable data to enter and exit from the scenarios (Shin, Son and Heo 2015).
Inside connections: The internal employees of the company is also able to intentionally and
inadvertently access various sectors of network that should not be accessed to. This also includes the
compromising of endpoints.
The passwords must be changed on regular basis. The levels of access and authentication
must for the employees. Moreover, they must have the overall access to various file shares along
with systems and so on. These are required to fulfill the overall duties. Here, different types of
special requests has been always escalated to the group. Further, any single user that has been having
authority have been authorizing the request (Scott-Hayward, Natarajan and Sezer 2016).
Vulnerability from Trojan human:
The Trojan human has been coming to business in various kinds of disguise. They is done in
the business attire in legitimate repairman. The kinds of tricksters is been known for penetrating
various pretty secure scenarios. This also include server rooms. With the help of individual social
conditioning, there is the tendency of not stopping and making queries to suitably attired person that
are not identified in the environment of business (Shan and Liao 2016). The staffs might not think
found within the picture frames of Insignia that were sold during Christmas. This has been coming
directly from various manufacturers.
Ways of mitigation:
Deploying and enforcing the resource policies and controls that the devices are able to enter
the environment and the time of entering. Next, a follow up must be taken from the frequent policy
reminders. The “department of defence” in 2008, has created policies and then banned USB and
various additional removable data to enter and exit from the scenarios (Shin, Son and Heo 2015).
Inside connections: The internal employees of the company is also able to intentionally and
inadvertently access various sectors of network that should not be accessed to. This also includes the
compromising of endpoints.
The passwords must be changed on regular basis. The levels of access and authentication
must for the employees. Moreover, they must have the overall access to various file shares along
with systems and so on. These are required to fulfill the overall duties. Here, different types of
special requests has been always escalated to the group. Further, any single user that has been having
authority have been authorizing the request (Scott-Hayward, Natarajan and Sezer 2016).
Vulnerability from Trojan human:
The Trojan human has been coming to business in various kinds of disguise. They is done in
the business attire in legitimate repairman. The kinds of tricksters is been known for penetrating
various pretty secure scenarios. This also include server rooms. With the help of individual social
conditioning, there is the tendency of not stopping and making queries to suitably attired person that
are not identified in the environment of business (Shan and Liao 2016). The staffs might not think
8INVESTIGATING NETWORK SECURITY
twice regarding swiping the access card for allowing uninformed workers to their servicing
environment. This takes less time for unsupervised people in server tools for infecting the networks
(Cve.mitre.org 2019).
Things to be done:
Here, reminders must be set to employee regarding authorized third parties. The sources must
be identified through asking questions and without making any assumption.
Optical media:
There has been instances of leaking and stealing confidential information to different public
networks. It is claimed that as they access any networked workstation, he gets access to classified
data that has comprised of authorized credentials for and storing data in encrypted archives (Shin,
Wang and Gu 2015). Hence, for instance, recordable media appearing to be legitimate is used as the
stored data. This has been in and out of the business networks. Besides, it has been similar to
different thumb drives. Moreover, they can be utilized as the source for infection of the overall
network.
Ways of mitigation:
Similar to USB tip, it is vital for implementing and enforcing the resources controlling the
policies across what devices has been able to enter the scenario and when. Next, the frequent policy
reminders are to be followed up.
Hindsight is 20/20:
twice regarding swiping the access card for allowing uninformed workers to their servicing
environment. This takes less time for unsupervised people in server tools for infecting the networks
(Cve.mitre.org 2019).
Things to be done:
Here, reminders must be set to employee regarding authorized third parties. The sources must
be identified through asking questions and without making any assumption.
Optical media:
There has been instances of leaking and stealing confidential information to different public
networks. It is claimed that as they access any networked workstation, he gets access to classified
data that has comprised of authorized credentials for and storing data in encrypted archives (Shin,
Wang and Gu 2015). Hence, for instance, recordable media appearing to be legitimate is used as the
stored data. This has been in and out of the business networks. Besides, it has been similar to
different thumb drives. Moreover, they can be utilized as the source for infection of the overall
network.
Ways of mitigation:
Similar to USB tip, it is vital for implementing and enforcing the resources controlling the
policies across what devices has been able to enter the scenario and when. Next, the frequent policy
reminders are to be followed up.
Hindsight is 20/20:
9INVESTIGATING NETWORK SECURITY
Maximum of the list has been found to be focusing on mitigation of the threats. These have
been capitalizing on digital technologies. It must not be forgotten that human mind has also been
efficient at storing data.
Ways of mitigation:
Here, the best process of security is to become overall conscious and become alert. It is the
overall threat while working over type of sensitive elements. Though it has been indicated for
stopping of that has been done to momentarily see the environment (Cvedetails.com 2019).
Smartphones and digital devices:
Currently, the phones has been more than just allowing calls. They have been full filling the
actions of computers, compete with Wi-Fi connections, high storage capacities, multithread
operating systems, huge support of applications and high-resolution cameras. Next, with other
portable devices, there has been green light for business scenarios (Liyanage et al. 2016). The new
devices have the efficiency of posing the similar threats that are seen on thumb drives and systems.
Furthermore, the system comprises of the ability. This is to elude the conventional solutions that are
data-lead preventions.
Ways of mitigation:
Here the similar rules for optical media and USB devics are applicable. Enforcing and
implementation of resource policies and controls across the devices has been able to enter the
scenario and the time of happening (Cwe.mitre.org 2019).
E-mail:
Maximum of the list has been found to be focusing on mitigation of the threats. These have
been capitalizing on digital technologies. It must not be forgotten that human mind has also been
efficient at storing data.
Ways of mitigation:
Here, the best process of security is to become overall conscious and become alert. It is the
overall threat while working over type of sensitive elements. Though it has been indicated for
stopping of that has been done to momentarily see the environment (Cvedetails.com 2019).
Smartphones and digital devices:
Currently, the phones has been more than just allowing calls. They have been full filling the
actions of computers, compete with Wi-Fi connections, high storage capacities, multithread
operating systems, huge support of applications and high-resolution cameras. Next, with other
portable devices, there has been green light for business scenarios (Liyanage et al. 2016). The new
devices have the efficiency of posing the similar threats that are seen on thumb drives and systems.
Furthermore, the system comprises of the ability. This is to elude the conventional solutions that are
data-lead preventions.
Ways of mitigation:
Here the similar rules for optical media and USB devics are applicable. Enforcing and
implementation of resource policies and controls across the devices has been able to enter the
scenario and the time of happening (Cwe.mitre.org 2019).
E-mail:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10INVESTIGATING NETWORK SECURITY
This has been sued frequently under business for sending and receiving information. Besides,
it has been commonly misused. Here, messages having confidential data is easily forwarded to
external targets. Additionally, the e-mails themselves are able to carry harmful viruses. Here the
targeted e-mails are also able to phish for various credentials for success for the staffs. These
credentials that are stolen gets leveraged under the attack of second-stage (Fielder et al. 2016).
Ways of mitigation:
Having the security of email in place, the source can be identified. The sender using he
technologies such as PGP must be identified. Otherwise, a simple array of queries must be utilized
prior sending sensitive data. The control of access to wider alias-based addresses of emails can also
be enforced. Besides, the reminders and policies must also be sent to employees.
3. Guide for setting up system for the attacking scenario:
In order to understand the scenario, the environment of GH 5.53 forensic lab is considered
here. Here, the case within the virtual machines is considered for avoiding the impacts on real
systems. This FSL or Forensic Science laboratory of Ghana police was established for providing
effective scientific support to different criminal investigations. This is the only one forensic service
for them and catering various regions at Ghana. The steps are demonstrated hereafter. Here, the
execution, detection and mitigation processes are also analyzed.
Step 1: Initial assessment:
The assets are to be identified and the critical value and risks are to be defined for every
service. These are based on the input of the clients. It also includes security analysis scanner of
vulnerability. This is also helpful to determine minimum of the importance of the device in the
network of devices that are tested. Moreover, this is also vital to know the devices that can be
This has been sued frequently under business for sending and receiving information. Besides,
it has been commonly misused. Here, messages having confidential data is easily forwarded to
external targets. Additionally, the e-mails themselves are able to carry harmful viruses. Here the
targeted e-mails are also able to phish for various credentials for success for the staffs. These
credentials that are stolen gets leveraged under the attack of second-stage (Fielder et al. 2016).
Ways of mitigation:
Having the security of email in place, the source can be identified. The sender using he
technologies such as PGP must be identified. Otherwise, a simple array of queries must be utilized
prior sending sensitive data. The control of access to wider alias-based addresses of emails can also
be enforced. Besides, the reminders and policies must also be sent to employees.
3. Guide for setting up system for the attacking scenario:
In order to understand the scenario, the environment of GH 5.53 forensic lab is considered
here. Here, the case within the virtual machines is considered for avoiding the impacts on real
systems. This FSL or Forensic Science laboratory of Ghana police was established for providing
effective scientific support to different criminal investigations. This is the only one forensic service
for them and catering various regions at Ghana. The steps are demonstrated hereafter. Here, the
execution, detection and mitigation processes are also analyzed.
Step 1: Initial assessment:
The assets are to be identified and the critical value and risks are to be defined for every
service. These are based on the input of the clients. It also includes security analysis scanner of
vulnerability. This is also helpful to determine minimum of the importance of the device in the
network of devices that are tested. Moreover, this is also vital to know the devices that can be
11INVESTIGATING NETWORK SECURITY
accesses by member of GH 5.53 forensic lab. This also includes their authorized users and
administrators.
Here, various strategic factors are to be considered. Further, a clear understanding of various
details is to be done. They include, countermeasures for every device or service, as the service gets
correlated to the device, treatment of residual risks, practices of risk mitigation and policies for every
device, level of risk tolerance and risk appetite (Czyz et al. 2016).
Step 2: Defining system baseline:
Information must be gathered regarding systems prior the analysis of the vulnerability is
done. A review of the devices must be done for the open services, processes and ports. Those must
not be opened. Further, the approved software and drivers are to be understood. These must not be
installed on those devolves and the primary configuration of every device. As the device of a
perimeter one, this must not possess the default administrator username should be get configured.
Trying to do a banner grabbing or learning the overall type of public data is accessible. This is based
on considerable baseline. It must be also determined whether the device has been sending longs to
the SIEM or “Security Information and Event Management” platform. Besides, the logs that are
stored in core repository has to be determined. Besides, various vulnerabilities and public
information about the vendor, version, device platform and additional relevant details are to be
determined.
Step 3: Performing the vulnerability scan:
Next, proper policy on the scanner is to be used for accomplishing the intended outcomes.
Before starting the scanning of vulnerability, the compliance requirements are to be looked on the
basis of the business and posture of GH 5.53 forensic lab. Then the best date and time is to be found
accesses by member of GH 5.53 forensic lab. This also includes their authorized users and
administrators.
Here, various strategic factors are to be considered. Further, a clear understanding of various
details is to be done. They include, countermeasures for every device or service, as the service gets
correlated to the device, treatment of residual risks, practices of risk mitigation and policies for every
device, level of risk tolerance and risk appetite (Czyz et al. 2016).
Step 2: Defining system baseline:
Information must be gathered regarding systems prior the analysis of the vulnerability is
done. A review of the devices must be done for the open services, processes and ports. Those must
not be opened. Further, the approved software and drivers are to be understood. These must not be
installed on those devolves and the primary configuration of every device. As the device of a
perimeter one, this must not possess the default administrator username should be get configured.
Trying to do a banner grabbing or learning the overall type of public data is accessible. This is based
on considerable baseline. It must be also determined whether the device has been sending longs to
the SIEM or “Security Information and Event Management” platform. Besides, the logs that are
stored in core repository has to be determined. Besides, various vulnerabilities and public
information about the vendor, version, device platform and additional relevant details are to be
determined.
Step 3: Performing the vulnerability scan:
Next, proper policy on the scanner is to be used for accomplishing the intended outcomes.
Before starting the scanning of vulnerability, the compliance requirements are to be looked on the
basis of the business and posture of GH 5.53 forensic lab. Then the best date and time is to be found
12INVESTIGATING NETWORK SECURITY
out for performing the scan. This is vital to determine the context of the industry client and find
whether the scan is done all at once or as any segmentation is required. Here, a vital step has been to
re-defining and receiving the approval of the overall policy. This is to scan the vulnerability that is to
be done. In order to retrieve the best outcomes, related plug-ins and tools are to be used on the
platform of vulnerability analysis (van Staalduinen, Khan and Gadag 2016). This includes the
overall payment card industry data security standard or OCIDSS preparation. This is for numerous
web applications, different kinds of open web application security project or OWASP and OWASP
checks, total scan, DDoS or Distributed Denial-of-service attacks, exploits, aggressive scan and
stealth scan. This also includes firewall scan, most common scanning of best ports like 65,535 ports,
quick scan, CMS web scan like common CMS, Drupal, Wordpress and Joomla and best scan like
popular ports.
It must also be reminded that GH 5.53 forensic lab needs to perform manual scan for every
complex resources (Leng et al. 2015). This is to assure the most effective results, assure to configure
the credentials for the scanner configuring for performing better and in-depth vulnerability analysis.
Step 4: Vulnerability analysis report development:
This is the most vital step for creating report. GH 5.53 forensic lab must pay attention on
details and try to include extra value on the phase of recommendations. In order to receive the actual
value from the ultimate report, GH 5.53 forensic lab must involve recommendations on the basis of
goals of initial analysis. Moreover, various techniques of risk mitigation are to be added. This must
be on the basis of various complexities of resources and outcomes. The findings are to be added that
are related to probable gaps taking place between the outcomes and definition of system baseline.
The last one indicates the deviations and mitigation of probable vulnerabilities. The vulnerability
out for performing the scan. This is vital to determine the context of the industry client and find
whether the scan is done all at once or as any segmentation is required. Here, a vital step has been to
re-defining and receiving the approval of the overall policy. This is to scan the vulnerability that is to
be done. In order to retrieve the best outcomes, related plug-ins and tools are to be used on the
platform of vulnerability analysis (van Staalduinen, Khan and Gadag 2016). This includes the
overall payment card industry data security standard or OCIDSS preparation. This is for numerous
web applications, different kinds of open web application security project or OWASP and OWASP
checks, total scan, DDoS or Distributed Denial-of-service attacks, exploits, aggressive scan and
stealth scan. This also includes firewall scan, most common scanning of best ports like 65,535 ports,
quick scan, CMS web scan like common CMS, Drupal, Wordpress and Joomla and best scan like
popular ports.
It must also be reminded that GH 5.53 forensic lab needs to perform manual scan for every
complex resources (Leng et al. 2015). This is to assure the most effective results, assure to configure
the credentials for the scanner configuring for performing better and in-depth vulnerability analysis.
Step 4: Vulnerability analysis report development:
This is the most vital step for creating report. GH 5.53 forensic lab must pay attention on
details and try to include extra value on the phase of recommendations. In order to receive the actual
value from the ultimate report, GH 5.53 forensic lab must involve recommendations on the basis of
goals of initial analysis. Moreover, various techniques of risk mitigation are to be added. This must
be on the basis of various complexities of resources and outcomes. The findings are to be added that
are related to probable gaps taking place between the outcomes and definition of system baseline.
The last one indicates the deviations and mitigation of probable vulnerabilities. The vulnerability
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13INVESTIGATING NETWORK SECURITY
analysis findings are commonly very helpful and is ordered to assure the understanding of that
finding (Duffield 2017).
It is important to put various details in mind. Next, high and medium vulnerabilities are to be
realized that must consist of a detailed report. They are the name of vulnerability, date of discovery,
scope on the basis of CVE or Common Vulnerabilities and Exposure databases, in-depth description
of vulnerabilities and details about the systems affected. This also includes details of the methods to
correct those vulnerabilities. Further, there are PoC or proof of concept of vulnerability for that
system as possible. This also includes the black area for the vulnerability owner, time that is
considered to be correct, following revision and different countermeasures taking place between
ultimate solutions.
Hence, it can be said that armed with these primary list, GH 5.53 forensic lab, while
undertaking vulnerability analysis of various elements can be considered. This includes the
suggestion phase reflecting the total awareness of security posture in various aspects of the above
methods. This is also helpful to deliver effective result for the things that is most cases has been a
mere tool for compliance (Bays et al. 2015).
4. Critical reflection of the task done and personal development gained:
It is understood that as the project is organized and the IP address and data is understood, this
is the time to schedule network vulnerability scanning. As the vulnerabilities ate identified and the
false positives are determined, one requires to analyze the flaws that can harm the business
ultimately. The above study helps in determining how the flaws have been affecting the business
harm the devices and systems. The IT team has prioritized what element has to be resolved at first.
analysis findings are commonly very helpful and is ordered to assure the understanding of that
finding (Duffield 2017).
It is important to put various details in mind. Next, high and medium vulnerabilities are to be
realized that must consist of a detailed report. They are the name of vulnerability, date of discovery,
scope on the basis of CVE or Common Vulnerabilities and Exposure databases, in-depth description
of vulnerabilities and details about the systems affected. This also includes details of the methods to
correct those vulnerabilities. Further, there are PoC or proof of concept of vulnerability for that
system as possible. This also includes the black area for the vulnerability owner, time that is
considered to be correct, following revision and different countermeasures taking place between
ultimate solutions.
Hence, it can be said that armed with these primary list, GH 5.53 forensic lab, while
undertaking vulnerability analysis of various elements can be considered. This includes the
suggestion phase reflecting the total awareness of security posture in various aspects of the above
methods. This is also helpful to deliver effective result for the things that is most cases has been a
mere tool for compliance (Bays et al. 2015).
4. Critical reflection of the task done and personal development gained:
It is understood that as the project is organized and the IP address and data is understood, this
is the time to schedule network vulnerability scanning. As the vulnerabilities ate identified and the
false positives are determined, one requires to analyze the flaws that can harm the business
ultimately. The above study helps in determining how the flaws have been affecting the business
harm the devices and systems. The IT team has prioritized what element has to be resolved at first.
14INVESTIGATING NETWORK SECURITY
Various remediation efforts demonstrated above has focused on with the execution plan and timeline
to complete the remediation.
Utilization of proper tools has been vital to analyze the vulnerabilities. This is the best
practice and helps in developing that process. Here, the tools of vulnerability analysis ate been
developed for finding what vulnerabilities has been there. Business like GH 5.53 forensic lab can
also go for open source vulnerability scanner for analysis and scanning. Depending on the
individual vulnerabilities of the network, the outcomes of the scan and procedures might look to be
distinct. Besides, one can ask the team to concentrate on some activities to begin. Then the network
threats are to be identified and prioritized. The routers and WiFi passwords are to be assessed for
those vulnerabilities. Besides, the network strength of the business against common attacks must
involve DDoS or Distributed Denial of Service, MTM or Man-in-the-Middle. Here the overall attack
has been along with various Network Intrusions. Further, the computers, switches and routers for the
device security must be analyzed. Though the analysis of vulnerability tools has been determining
flaws of security, they can never be found out for the loopholes causing harm and that cannot. This is
the reason why the tests of penetration have been vital for purposefully. This has been ethically
exploiting various kinds of vulnerabilities and determining. This is the one leading to the threats.
This, unlike various malicious hackers, the overall ethical hackers is able to different empowers the
business. This is for better finishing the overall vulnerabilities. This is prior they have included the
spiral out of control and leading to various types damages that are catastrophic. Moreover, the
hackers are been looking at loopholes for making the companies secured and not break into systems
and networks for their individual achievement. Thus the ethical hackers and penetration testers hired
must have the track record of performing with reputable business and gain their client outcomes.
This vulnerability analysis must be document from beginning to ending. The analysis must also
create the analysis report for interpreting and tracking remediation efforts and vulnerabilities.
Various remediation efforts demonstrated above has focused on with the execution plan and timeline
to complete the remediation.
Utilization of proper tools has been vital to analyze the vulnerabilities. This is the best
practice and helps in developing that process. Here, the tools of vulnerability analysis ate been
developed for finding what vulnerabilities has been there. Business like GH 5.53 forensic lab can
also go for open source vulnerability scanner for analysis and scanning. Depending on the
individual vulnerabilities of the network, the outcomes of the scan and procedures might look to be
distinct. Besides, one can ask the team to concentrate on some activities to begin. Then the network
threats are to be identified and prioritized. The routers and WiFi passwords are to be assessed for
those vulnerabilities. Besides, the network strength of the business against common attacks must
involve DDoS or Distributed Denial of Service, MTM or Man-in-the-Middle. Here the overall attack
has been along with various Network Intrusions. Further, the computers, switches and routers for the
device security must be analyzed. Though the analysis of vulnerability tools has been determining
flaws of security, they can never be found out for the loopholes causing harm and that cannot. This is
the reason why the tests of penetration have been vital for purposefully. This has been ethically
exploiting various kinds of vulnerabilities and determining. This is the one leading to the threats.
This, unlike various malicious hackers, the overall ethical hackers is able to different empowers the
business. This is for better finishing the overall vulnerabilities. This is prior they have included the
spiral out of control and leading to various types damages that are catastrophic. Moreover, the
hackers are been looking at loopholes for making the companies secured and not break into systems
and networks for their individual achievement. Thus the ethical hackers and penetration testers hired
must have the track record of performing with reputable business and gain their client outcomes.
This vulnerability analysis must be document from beginning to ending. The analysis must also
create the analysis report for interpreting and tracking remediation efforts and vulnerabilities.
15INVESTIGATING NETWORK SECURITY
The testing of network and reporting has not been the one-time procedure. The business must
deploy the security culture focusing on the ongoing security of the business. Though the Chief
Security Officer and IT team has been focusing on the real security analysis, the residual employees
must also take part in the training of their own for network security analysis. They must walk with
the team that the latest kind of ransomware and different threats ransomware. Besides, it has been
phishing of email scams and notably amount of of the constantly updating of different practicing and
systems of good security of data must be done. More the team is aware of the threats, happening all
the time, they boot up the devices. Thus they have been more likely trying and stopping the attack
prior it gets late. Thus, the network must be kept safe and secured for cornerstoring the business.
Though any network vulnerability analysis take few resources and time, this also alleviates the
economic burden to deal with the hacking prevented simply through understanding the weakness of
the network.
5. Conclusion:
The above report helps in understanding underpinning flaws of CVE database and CWE.
Various processes of exploitation for the vulnerability is found out and the successful attacks are
discussed that is launched under the virtual scenario. The study investigates the way in which the
specific attack is detected. Next, the counter measures are to be critically analyzed that is helpful to
prevent and mitigate the risks of the attacks. This is helpful to make proper references for principles
of security design.
The testing of network and reporting has not been the one-time procedure. The business must
deploy the security culture focusing on the ongoing security of the business. Though the Chief
Security Officer and IT team has been focusing on the real security analysis, the residual employees
must also take part in the training of their own for network security analysis. They must walk with
the team that the latest kind of ransomware and different threats ransomware. Besides, it has been
phishing of email scams and notably amount of of the constantly updating of different practicing and
systems of good security of data must be done. More the team is aware of the threats, happening all
the time, they boot up the devices. Thus they have been more likely trying and stopping the attack
prior it gets late. Thus, the network must be kept safe and secured for cornerstoring the business.
Though any network vulnerability analysis take few resources and time, this also alleviates the
economic burden to deal with the hacking prevented simply through understanding the weakness of
the network.
5. Conclusion:
The above report helps in understanding underpinning flaws of CVE database and CWE.
Various processes of exploitation for the vulnerability is found out and the successful attacks are
discussed that is launched under the virtual scenario. The study investigates the way in which the
specific attack is detected. Next, the counter measures are to be critically analyzed that is helpful to
prevent and mitigate the risks of the attacks. This is helpful to make proper references for principles
of security design.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16INVESTIGATING NETWORK SECURITY
6. References:
Almohri, H.M., Watson, L.T., Yao, D. and Ou, X., 2016. Security optimization of dynamic networks
with probabilistic graph modeling and linear programming. IEEE Transactions on Dependable and
Secure Computing, 13(4), pp.474-487.
Bays, L.R., Oliveira, R.R., Barcellos, M.P., Gaspary, L.P. and Madeira, E.R.M., 2015. Virtual
network security: threats, countermeasures, and challenges. Journal of Internet Services and
Applications, 6(1), p.1.
Cve.mitre.org., 2019. CVE -Home. [online] Available at: https://cve.mitre.org/about/index.html
[Accessed 3 Feb. 2019].
Cwe.mitre.org., 2019)., CWE -Common Weakness Enumeration. [online] Available at:
http://cwe.mitre.org/index.html [Accessed 3 Feb. 2019].
Czyz, J., Luckie, M.J., Allman, M. and Bailey, M., 2016, February. Don't Forget to Lock the Back
Door! A Characterization of IPv6 Network Security Policy. In NDSS.
Duffield, M., 2017. War as a network enterprise: the new security terrain and its implications. In The
Criminology of War (pp. 109-121). Routledge.
Durkota, K., Lisý, V., Bosanský, B. and Kiekintveld, C., 2015, July. Optimal Network Security
Hardening Using Attack Graph Games. In IJCAI (pp. 526-532).
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision Support Systems, 86, pp.13-23.
6. References:
Almohri, H.M., Watson, L.T., Yao, D. and Ou, X., 2016. Security optimization of dynamic networks
with probabilistic graph modeling and linear programming. IEEE Transactions on Dependable and
Secure Computing, 13(4), pp.474-487.
Bays, L.R., Oliveira, R.R., Barcellos, M.P., Gaspary, L.P. and Madeira, E.R.M., 2015. Virtual
network security: threats, countermeasures, and challenges. Journal of Internet Services and
Applications, 6(1), p.1.
Cve.mitre.org., 2019. CVE -Home. [online] Available at: https://cve.mitre.org/about/index.html
[Accessed 3 Feb. 2019].
Cwe.mitre.org., 2019)., CWE -Common Weakness Enumeration. [online] Available at:
http://cwe.mitre.org/index.html [Accessed 3 Feb. 2019].
Czyz, J., Luckie, M.J., Allman, M. and Bailey, M., 2016, February. Don't Forget to Lock the Back
Door! A Characterization of IPv6 Network Security Policy. In NDSS.
Duffield, M., 2017. War as a network enterprise: the new security terrain and its implications. In The
Criminology of War (pp. 109-121). Routledge.
Durkota, K., Lisý, V., Bosanský, B. and Kiekintveld, C., 2015, July. Optimal Network Security
Hardening Using Attack Graph Games. In IJCAI (pp. 526-532).
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision Support Systems, 86, pp.13-23.
17INVESTIGATING NETWORK SECURITY
FIRST — Forum of Incident Response and Security Teams., 2019. Common Vulnerability Scoring
System Version 3.0 Calculator. [online] Available at: https://www.first.org/cvss/calculator/3.0
[Accessed 3 Feb. 2019].
Humayed, A., Lin, J., Li, F. and Luo, B., 2017. Cyber-physical systems security—A survey. IEEE
Internet of Things Journal, 4(6), pp.1802-1831.
Jokar, P., Arianpoo, N. and Leung, V.C., 2016. A survey on security issues in smart grids. Security
and Communication Networks, 9(3), pp.262-273.
Leng, J., Zhou, Y., Zhang, J. and Hu, C., 2015. An inference attack model for flow table capacity
and usage: Exploiting the vulnerability of flow table overflow in software-defined network. arXiv
preprint arXiv:1504.03095.
Li, F., Durumeric, Z., Czyz, J., Karami, M., Bailey, M., McCoy, D., Savage, S. and Paxson, V.,
2016, August. You've Got Vulnerability: Exploring Effective Vulnerability Notifications. In
USENIX Security Symposium (pp. 1033-1050).
Liyanage, M., Abro, A.B., Ylianttila, M. and Gurtov, A., 2016. Opportunities and challenges of
software-defined mobile networks in network security. IEEE Security & Privacy, 14(4), pp.34-44.
Nvd.nist.gov., 2019., NVD - CVSS v2 Calculator. [online] Available at: https://nvd.nist.gov/vuln-
metrics/cvss/v2-calculator?calculator&adv&version=2 [Accessed 3 Feb. 2019].
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC
press.
FIRST — Forum of Incident Response and Security Teams., 2019. Common Vulnerability Scoring
System Version 3.0 Calculator. [online] Available at: https://www.first.org/cvss/calculator/3.0
[Accessed 3 Feb. 2019].
Humayed, A., Lin, J., Li, F. and Luo, B., 2017. Cyber-physical systems security—A survey. IEEE
Internet of Things Journal, 4(6), pp.1802-1831.
Jokar, P., Arianpoo, N. and Leung, V.C., 2016. A survey on security issues in smart grids. Security
and Communication Networks, 9(3), pp.262-273.
Leng, J., Zhou, Y., Zhang, J. and Hu, C., 2015. An inference attack model for flow table capacity
and usage: Exploiting the vulnerability of flow table overflow in software-defined network. arXiv
preprint arXiv:1504.03095.
Li, F., Durumeric, Z., Czyz, J., Karami, M., Bailey, M., McCoy, D., Savage, S. and Paxson, V.,
2016, August. You've Got Vulnerability: Exploring Effective Vulnerability Notifications. In
USENIX Security Symposium (pp. 1033-1050).
Liyanage, M., Abro, A.B., Ylianttila, M. and Gurtov, A., 2016. Opportunities and challenges of
software-defined mobile networks in network security. IEEE Security & Privacy, 14(4), pp.34-44.
Nvd.nist.gov., 2019., NVD - CVSS v2 Calculator. [online] Available at: https://nvd.nist.gov/vuln-
metrics/cvss/v2-calculator?calculator&adv&version=2 [Accessed 3 Feb. 2019].
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC
press.
18INVESTIGATING NETWORK SECURITY
Pokhrel, N.R. and Tsokos, C.P., 2017. Cybersecurity: A Stochastic Predictive Model to Determine
Overall Network Security Risk Using Markovian Process. Journal of Information Security, 8(02),
p.91.
Schneier, B., 2015. Secrets and lies: digital security in a networked world. John Wiley & Sons.
Scott-Hayward, S., Natarajan, S. and Sezer, S., 2016. A survey of security in software defined
networks. IEEE Communications Surveys & Tutorials, 18(1), pp.623-654.
Sgora, A., Vergados, D.D. and Chatzimisios, P., 2016. A survey on security and privacy issues in
wireless mesh networks. Security and Communication Networks, 9(13), pp.1877-1889.
Shan, Z. and Liao, B., 2016. Design and Implementation of A Network Security Management
System. arXiv preprint arXiv:1609.00099.
Shin, J., Son, H. and Heo, G., 2015. Development of a cyber security risk model using Bayesian
networks. Reliability Engineering & System Safety, 134, pp.208-217.
Shin, S., Wang, H. and Gu, G., 2015. A first step toward network security virtualization: from
concept to prototype. IEEE Transactions on Information Forensics and Security, 10(10), pp.2236-
2249.
Singhal, A. and Ou, X., 2017. Security risk analysis of enterprise networks using probabilistic attack
graphs. In Network Security Metrics (pp. 53-73). Springer, Cham.
Sun, C.C., Liu, C.C. and Xie, J., 2016. Cyber-physical system security of a power grid: State-of-the-
art. Electronics, 5(3), p.40.
Sun, X., Men, S., Zhao, C. and Zhou, Z., 2015. A security authentication scheme in machine‐to‐
machine home network service. Security and Communication Networks, 8(16), pp.2678-2686.
Pokhrel, N.R. and Tsokos, C.P., 2017. Cybersecurity: A Stochastic Predictive Model to Determine
Overall Network Security Risk Using Markovian Process. Journal of Information Security, 8(02),
p.91.
Schneier, B., 2015. Secrets and lies: digital security in a networked world. John Wiley & Sons.
Scott-Hayward, S., Natarajan, S. and Sezer, S., 2016. A survey of security in software defined
networks. IEEE Communications Surveys & Tutorials, 18(1), pp.623-654.
Sgora, A., Vergados, D.D. and Chatzimisios, P., 2016. A survey on security and privacy issues in
wireless mesh networks. Security and Communication Networks, 9(13), pp.1877-1889.
Shan, Z. and Liao, B., 2016. Design and Implementation of A Network Security Management
System. arXiv preprint arXiv:1609.00099.
Shin, J., Son, H. and Heo, G., 2015. Development of a cyber security risk model using Bayesian
networks. Reliability Engineering & System Safety, 134, pp.208-217.
Shin, S., Wang, H. and Gu, G., 2015. A first step toward network security virtualization: from
concept to prototype. IEEE Transactions on Information Forensics and Security, 10(10), pp.2236-
2249.
Singhal, A. and Ou, X., 2017. Security risk analysis of enterprise networks using probabilistic attack
graphs. In Network Security Metrics (pp. 53-73). Springer, Cham.
Sun, C.C., Liu, C.C. and Xie, J., 2016. Cyber-physical system security of a power grid: State-of-the-
art. Electronics, 5(3), p.40.
Sun, X., Men, S., Zhao, C. and Zhou, Z., 2015. A security authentication scheme in machine‐to‐
machine home network service. Security and Communication Networks, 8(16), pp.2678-2686.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19INVESTIGATING NETWORK SECURITY
van Staalduinen, M.A., Khan, F. and Gadag, V., 2016. SVAPP methodology: A predictive security
vulnerability assessment modeling method. Journal of Loss Prevention in the Process Industries, 43,
pp.397-413.
Wang, Z., 2015. Network Threat Analysis based on Vulnerability Relation Model. International
Journal of Security and Its Applications, 9(1), pp.357-368.
White, G.B., Fisch, E.A. and Pooch, U.W., 2017. Computer system and network security. CRC
press.
Wurm, J., Hoang, K., Arias, O., Sadeghi, A.R. and Jin, Y., 2016, January. Security analysis on
consumer and industrial iot devices. In Design Automation Conference (ASP-DAC), 2016 21st Asia
and South Pacific (pp. 519-524). IEEE.
Zhou, Q. and Luo, J., 2017. The study on evaluation method of urban network security in the big
data era. Intelligent Automation & Soft Computing, pp.1-6.
Zhu, Y., Yan, J., Tang, Y., Sun, Y.L. and He, H., 2015. Joint substation-transmission line
vulnerability assessment against the smart grid. IEEE Transactions on Information Forensics and
Security, 10(5), pp.1010-1024.
van Staalduinen, M.A., Khan, F. and Gadag, V., 2016. SVAPP methodology: A predictive security
vulnerability assessment modeling method. Journal of Loss Prevention in the Process Industries, 43,
pp.397-413.
Wang, Z., 2015. Network Threat Analysis based on Vulnerability Relation Model. International
Journal of Security and Its Applications, 9(1), pp.357-368.
White, G.B., Fisch, E.A. and Pooch, U.W., 2017. Computer system and network security. CRC
press.
Wurm, J., Hoang, K., Arias, O., Sadeghi, A.R. and Jin, Y., 2016, January. Security analysis on
consumer and industrial iot devices. In Design Automation Conference (ASP-DAC), 2016 21st Asia
and South Pacific (pp. 519-524). IEEE.
Zhou, Q. and Luo, J., 2017. The study on evaluation method of urban network security in the big
data era. Intelligent Automation & Soft Computing, pp.1-6.
Zhu, Y., Yan, J., Tang, Y., Sun, Y.L. and He, H., 2015. Joint substation-transmission line
vulnerability assessment against the smart grid. IEEE Transactions on Information Forensics and
Security, 10(5), pp.1010-1024.
1 out of 20
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.