This paper discusses network defences and counter measures for website and data security. It covers topics such as Common Vulnerabilities and Exposures, signature analysis, network baselining, cryptography, and more.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NETWORK DEFENCE AND COUNTER MEASURES Network defence and counter measures Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1NETWORK DEFENCE AND COUNTER MEASURES The foremost determination of this paper is to focus on the network defences and the counter measures considering the website and data security. TheCommonVulnerabilitiesandExposures(CVE)shouldbesupportedinall Intrusion Detection Systems (IDS) in order to achieved stronger security measures for the databases which stores larger amount of significant data (Milenkoski et al., 2015). The networking activities should be checked with the help of the signature analysis. Network baselining is very much for the identification of the suspicious network activities. The signature of the packets should be reviewed frequently to stop the improper network traffic activities like external threats such as the land attacks and false protocol numbers and from worms like Trojan Horses. The practice of tools such as AD Mutate should be encouraged considering the advanced development in the field of information technology. The misuse of the Remote Procedure Calls and the misuse of the CGI vulnerabilities are important for the maintenance of the website and data security. The data security can be maintained with the help of the cryptography which can restrict the author to access the data. The encryption standard was first proposed by IBM in 1976, later advanced encryption standard is proposed and implemented in all the major industries dealing with raw data. The application of the hash function is mainly due to the verification of the data which are transferred from one device to another. The concept of looping exists in the different types of encryption algorithms such as the block cipher, symmetric algorithm, asymmetric algorithm and stream cipher as it helps in authentication of the data (Karule & Nagrale, 2016). The hash algorithms are also used by the digital signatures for the authorisation of the data so that the integrity of the data in maintained. It can be said that the exchange of the primary key with the secondary key is one of the most important feature of the digitals signature which can help to maintain data security and data integrity. The authentication of more than one system is done by Internet Protocol Security (IPSec) which considers security measures such as SSL and SSH. The cryptographic systems are also vulnerable to the attacks such as XSL and generator attacks.
2NETWORK DEFENCE AND COUNTER MEASURES Reference Karule, K. P., & Nagrale, N. V. (2016). Comparative Analysis of Encryption Algorithms for Various Types of Data Files for Data Security.International Journal of Scientific Engineering and Applied Science (IJSEAS)–Volume-2, Issue-2. Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A., & Payne, B. D. (2015). Evaluating computerintrusiondetectionsystems:Asurveyofcommonpractices.ACM Computing Surveys (CSUR),48(1), 12.