logo

Network Security Tools Report

   

Added on  2020-02-24

7 Pages1141 Words38 Views
1
NETWORK SECURITY TOOLS
Demonstration of a network security tools

2
NETWORK SECURITY TOOLS
Abstract
Network security vulnerability scanning is the automated process identifying any security
vulnerabilities occurring in a network and determining whether the system can be threatened o
exploited by a person with no authority at any point on the system. If and where a system can be
exploited and threatened. Public servers assist in communication and transferring of data. These
public servers are however vulnerable to potentially harmful security issues and malicious
attacks. The vulnerability scan is employed to ensure such occurrences don’t happen and the
network system remains safe and in proper working condition. The vulnerability scanning
software checks for all security threats and compares them to the ones it has in a database and
gives a report which is usable by the individual or company to makes the security of its network
tighter. The most important function of the vulnerability scanner is to scan systems that have an
internet connection. It is also possible to audit a company's internal network and detect any
malicious software and suspicious employees in the enterprise.

3
NETWORK SECURITY TOOLS
Common threats and attacks on networked Information Systems.
Information systems need to be secure to prevent intrusion and malicious use of software
that may cause them harm. There are many ways intruder tries to get into the system for different
reasons. The most common threats and attacks include Packet replay, Packet modification,
Internet Protocol spoofing and Mail bombing.
Impersonation is when a sender of an email creates a fake return address [1]. It happens
when somebody manually modifies a moving header or the sender automatically connect them to
an SMTP port on the receiving node.
Eavesdropping occurs when Email headers and contents are sent without first being
encrypted. This makes it possible for the contents to be altered before arriving at the receiver or
modification is done on the header changing or hiding the sender. A hacker will thereby manage
to make a fake activity flow of the network. It will help them access sensitive information such
as passwords and other relevant data.
Packet modification is another vulnerability involving modification and interception of a
package by a system that was not the designated receiver [2]. The packet information required
may also get damaged due to the modification.
Packet replay works by recording and retransmitting message packets in a given network.
It affects all programs that need sequences to be authenticated and allows intruders to replay the
fake authentication sequences and manage to gain access to the attacked system.
Another common attack is an intrusion. It happens when a hacker uses their means, e.g.,
cracking tools and gains access to a system [2]. The use of a vulnerability tool would help the
technicians note any intrusion occurring in the network system.
Social engineering, another possible attack is employed by both outsiders and people
working inside the organization since it collaborates with the help of the user. The user gets
tricked to a level of revealing their security information, e.g., passwords which then used for the
malicious purpose. The best solution to social engineering is educating the users and ensuring
there are kept well aware of such tricks.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Intrusion Detection System PDF
|6
|966
|48

Threats, Attacks and Malware in IT Security - Desklib
|12
|1198
|192

Identification of Threats using Nmap and Metasploit Network Security Tools
|9
|1788
|54

COIT20262 Assignment 1 Submission
|7
|1565
|52

Cyber Security - Assignment PDF
|8
|2242
|71

COIT20262 - Advanced Network Security Assignment 1 Submission
|7
|1514
|20