logo

Network Security

   

Added on  2022-11-25

6 Pages779 Words439 Views
Running head: Network security
Network security
Name of Student
Name of the University
Author note
Network Security_1
1
NETWORK SECURITY
Table of Contents
Introduction................................................................................................................................2
Network threats..........................................................................................................................2
Cryptojacking.........................................................................................................................2
DDoS attack...........................................................................................................................3
Network security devices...........................................................................................................3
Instruction detection System (IDS)........................................................................................3
Firewall..................................................................................................................................3
Conclusion..................................................................................................................................3
Reference....................................................................................................................................5
Network Security_2
2
NETWORK SECURITY
Introduction
Threat in case of the network security, explains those things which have capabilities
to create harm to the network or cyber system. As the network devices can be exposed and
vulnerable; hence, for protecting the sensitive information providing strong security to the
network devices is vital. This report is going to focus on the network threats associated with
the Australia based financial technology company, named Afterpay. As the main motive of
this organization is to perform several financial transaction, therefore, it always stay ahead in
the list of the attackers. Two major type of network threats that might exploit the network of
Afterpay is going to be discussed here. In addition the essential network security devices for
avoiding these is also going to highlight here.
Network threats
Finance industries like Afterpay faces several threats and attacks by the network
attackers majorly due to their core operations. However, two major type of threat that the
Australian financial organization Afterpay faces are as follows;
Cryptojacking
In current age, the financial organizations are majorly relies on the process of
cryptography for carrying out secure financial transaction. Cryptocurrency is the digital asset,
designed for controlling and performing several financial transactions. With the increasing
popularity of this technique, the hackers are also coming up with ingenious ideas of for
exploiting the network system of the financial industry. The hackers can load several mining
codes to the victim’s network system and use their CPU resources for mining the
cryptocurrency, and affecting their system operations (Sigler 2018).
Network Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cryptocurrency and Cryptocurrency Hijacking
|9
|1276
|419

Assignment on Trends in Cybercrime
|13
|3063
|21

Computer Security
|5
|798
|352

Department of Computer Technology PDF
|5
|4213
|21

Crypto-currencies and Cybercrime Abstract
|15
|3472
|25

Arachni Firewall for Web Application Security | Desklib
|4
|567
|295