logo

Network Intrusion: Sources, Effects and Prevention

   

Added on  2023-06-09

10 Pages1815 Words434 Views
Running head: NETWORK INTRUSION
Network Intrusion
Name of the student:
Name of the university:
Author note:

1NETWORK INTRUSION
Abstract
The forensic report deals with network intrusion that an enterprise has faced. The report broadly
describes the sources of network intrusion and the effects that it has on corporate data. The main
sources of intrusions are Trojan horses, worms, viruses. There are different types of attack that
are performed on the network like the traffic flooding attack, protocol specific attack and so on.
However, the mentioned company faced the unauthorized action due to the release of worms into
the network.
Keywords: Network intrusion, Worms, Cybercrime, anti-viruses

2NETWORK INTRUSION
Table of Contents
Introduction......................................................................................................................................1
Discussion........................................................................................................................................1
Sources of network intrusion.......................................................................................................1
Traffic flooding Attack.....................................................................................................1
Protocol specific attacks....................................................................................................1
Asymmetric Routing attack..............................................................................................1
Worms and Trojans...........................................................................................................1
JLA enterprise Case Scenario..........................................................................................................1
Time of attack..............................................................................................................................1
The method by which the hacker intruded the network..............................................................1
The computers compromised by the attack.................................................................................1
Computers that were accessed.....................................................................................................1
Data extracted from the network.................................................................................................1
Type of attack conducted.............................................................................................................1
Total time the attacker had control over the network..................................................................1
Possibility of future attacks.........................................................................................................1
Conclusion.......................................................................................................................................1
References........................................................................................................................................1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Intrusion Detection System PDF
|6
|966
|48

ITC595 Research Project (Distributed Denial of Service Attacks)
|6
|3302
|205

Demonstration of Network Security Tools
|10
|2109
|85