logo

Network Management Security - Steps, Attack Methods, VPN Connection

   

Added on  2023-06-15

5 Pages593 Words119 Views
 | 
 | 
 | 
Running head: NETWORK MANAGEMENT SECURITY
Network Management Security
Name of the student:
Name of the university:
Author Note
Network Management Security - Steps, Attack Methods, VPN Connection_1

1NETWORK MANAGEMENT SECURITY
The various steps in management of network security
The network security management has been allowing the administrators to control the
network. This has comprised of the virtual and physical firewalls from a centralized location (Kim &
Feamster, 2013). The different steps in managing network security are demonstrated by the
following answers.
1. Listing the six ways by which an attacker can gain access to network:
The six ways by which an attacker gains access to a network are packet sniffing, buffer
overflow, dictionary attack, password cracking, brute force attack and social engineering (Barcena &
Wueest, 2015).
2. Response on blocking the ICMP packets:
The ICMP can lead to reconnaissance. It is the cause to block. The pings could be used to
find whether any host is on. Apart from this it also helps in determining whether the time exceeds
the part of the traceroute for mapping the network architectures (Piskozub, 2014). A thoughtful,
rational and measured approach is to be taken for the protections. To block the ICMP ultimately is
not the proper idea. However, picking and selecting the ting prevented and found the origin would
help to achieve the aim.
3. Features required delivering an effective VPN connection:
To make the VPN connection at first, the available account is to be found. The employees
must be consulted to obtain the access this account. Then the scopes must be researches to the new
report. For this, the type of privacy, security and the bandwidth required is to be considered (Houidi,
2016). As the VPN is purchased from the provider, payment should be made for the service. Then
the provider would supply the data need to access the VPN.
Network Management Security - Steps, Attack Methods, VPN Connection_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents