Investigating Network Security

   

Added on  2023-04-21

20 Pages5617 Words397 Views
Running head: INVESTIGATING NETWORK SECURITY
Investigating Network Security
(GH 5.53 forensic lab)
Name of the student:
Name of the university:
Author Note
Investigating Network Security_1
1INVESTIGATING NETWORK SECURITY
Executive summary
The following study performs a critical assessment of different type of network vulnerabilities and
underpinning flaws. This has involved detection, mitigation and counter measuring of those attacks.
After that, various process of detection, mitigation and counter measurements for various attacks are
also analyzed. The overall task is done within the scenario of virtual machine to avoid the effect of
actual systems. Furthermore, a guidance is provided to measure the network security attacks in the
context of GH 5.53 forensic laboratory. Lastly, a critical reflection is provided in the study on the
overall analysis done and various types of personal experience achieved.
Investigating Network Security_2
2INVESTIGATING NETWORK SECURITY
Table of Contents
1. Introduction:......................................................................................................................................3
2. Critical analysis of vulnerability and underpinning flaws:................................................................3
3. Guide for setting up system for the attacking scenario:..................................................................11
4. Critical reflection of the task done and personal development gained:...........................................14
5. Conclusion:......................................................................................................................................15
6. References:......................................................................................................................................16
Investigating Network Security_3
3INVESTIGATING NETWORK SECURITY
1. Introduction:
The network security is the system activity that is developed for protecting integrity and
usability of network. This also includes providing security to data. This includes various
technologies of software and hardware. It is useful to control the access to networks. This targets
various threats and the stop them to enter or spread then to individual network.
The software vulnerability refers to the defect or flaw in construction software. This is
exploited by attackers for obtaining privileges in the system. This also indicates the vulnerability
offering probable entry points for the system. In this study, the vulnerability present in the software
is examined. This software is been running on the network component and host-machine.
In this report a critical analysis for various vulnerabilities and underpinning flaws are
discusses. This also includes the detecting, mitigating and counter measuring for attacks. Next, a
step-by-step guidance to set up the system for this scenario of attack is investigated. This is done
under the environment of virtual machine for avoiding the impact of real systems. Here, the guide is
considered enough for reproducing the attack under the scenario of GH 5.53 forensic lab. At last, a
critical reflection is provided on the task done and different personal development gained.
2. Critical analysis of vulnerability and underpinning flaws:
It is seen that the present “state-of-the-art” of various network security appliances has been
undertaking huge job. This is to keep the cyber hackers away from invading the business. Various
vulnerabilities for the network security are demonstrated below. This also includes the underpinning
flaws. Besides, the ways to identify, mitigate and countermeasure are also provided hereafter.
Investigating Network Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Vulnerability Investigation: Buffer Overflow
|13
|4442
|347

Investigating Network Security
|1
|1619
|287

Host and Network Security
|19
|4301
|362

Forensic Based SDN in Data Centers | Report
|30
|7653
|30

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1577
|381

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1749
|483