logo

Network Security Fundamentals - Assignment

   

Added on  2021-02-19

10 Pages2840 Words41 Views
 | 
 | 
 | 
Network SecurityFundamentals
Network Security Fundamentals - Assignment_1

Table of ContentsIntroduction......................................................................................................................................4A. Preventing Vishing attacks .........................................................................................................41. What is asked by attackers and how the attacks are crafted?..................................................42. What messages are being used by attackers?..........................................................................43. How they trick users to enter the specific information?.........................................................54. Recommendations...................................................................................................................5B. Lightweight Cryptography..........................................................................................................61. Goals of lightweight cryptography and who is behind this?...................................................62. Will this be standardised and when this will appear?.............................................................63. Practical networked application where lightweight cryptography is being used....................6C. Network Firewall Comparison....................................................................................................71. Importance of firewall with respect to information security...................................................72. Comparison of features...........................................................................................................73. Additional features..................................................................................................................84. Recommendation.....................................................................................................................8D. Compare Port Scanners...............................................................................................................81. Analysis and discussion on importance of port scanners........................................................92. Snap shots of port scanning.....................................................................................................93. Identification and discussion of strengths and weakness of scanners...................................104. Recommendation and justification........................................................................................10Conclusion.....................................................................................................................................10References......................................................................................................................................11
Network Security Fundamentals - Assignment_2

IntroductionNetwork security refers to strategies of organisation which will ensure the security assetswith respect to traffic (Alsunbul, Tan and Srinivasan, 2016). It comprises of both hardware andsoftware technologies. Basically network security includes practices and policies which are optedfor prevention as well as monitoring unauthorised modifications, access, misuse or denial ofnetwork accessible resources. This assignment is based on New World Consulting Services(NWCS) renders security services and consultation to around 200 clients across Australia. Thisincludes details related with vishing attack, lightweight cryptography, network firewallcomparison and scrutiny among port scanners.A. Preventing Vishing attacks Vishing (VoIP or voice phishing) refers to an electronic fraud tactic where individuals aredevised to reveal their personal as well as financial information to illegitimate entities. 1. What is asked by attackers and how the attacks are crafted?This can be understood by taking an example of Microsoft tech support scam. Withrespect to this, intruder or attacker calls a victim by pretending to a member of technical supportteam of Microsoft and inform the victim that there system has been infected due to whichdifferent errors arises, they are malware. The attacker will ask for remote access and ask thevictim to install some fake anti malware software for resolving the problems. Some attackersmay have the bank account information for making payment. The objective of vishing scam is toinfect system of victim and have sensitive information.2. What messages are being used by attackers?Intruder tries to access the information through various ways. In this attacker pretends tobe legitimate person like a personnel from a bank or a technical support member of anyorganisation through which they can have access to their systems. Apart from this, by pretendingto be an credit card service provider through which they can get details of victims by making useof phone calls (Anwar and et. Al, 2017).3. How they trick users to enter the specific information?A victim may receive a regular phone call from an intruder claiming to be an “creditservices” and they are offering low credit card rates. They play around caller ID and display anumber which is similar to victim but last digit will be assorted but make it appear as local. They
Network Security Fundamentals - Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents