Overview of Network Security
VerifiedAdded on 2023/01/04
|6
|1018
|98
AI Summary
This document provides an analysis of security options for JKL Company, including threats and vulnerabilities, business requirements, and recommended security tools.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
OVERVIEW OF NETWORK SECURITY 1
Analysis of security options for JKL Company
Student’s name
University
Date
Analysis of security options for JKL Company
Student’s name
University
Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
OVERVIEW OF NETWORK SECURITY 2
Threats and vulnerabilities facing JKL Company
Computer viruses
This is programmed to spread to all computers. Computer viruses are typically spread
through email attachments or webpages that are downloaded on the internet. If virus got a
chance to penetrate into the network of the JKL Company, it may interfere with the security
settings and steal confidential data like passwords or even delete the data of the company that
are stored on the user drives.
Computer viruses may gain entry into the system of the company and since its
operations comprise of multiple data exchange over the two company sites on a network.
This would create loophole on company network because the chances of downloading data or
sending information are high.
Trojan attack
• The attack happens when the system user executes a malicious code which hides behind a
good program. It is usually spread via emails by the attackers and cab seen as valid email by
other people.
• Since Trojan attack is circulated via email, after entering the system, it may record
password and steal critical data of the organization. The communication and collaboration of
the JKL staff in its two sites encourage Trojan attacks that spread over the corporate network.
Business requirements of JKL Company
• When it comes to securing the company network, the conditions involve a secure internet
gate that would ensure robust cloud security.
• The security strategy would help in mitigating the vulnerability issues of the DNS and the
IP layers. Therefore the company would be able to itself from a ransomware attack.
Threats and vulnerabilities facing JKL Company
Computer viruses
This is programmed to spread to all computers. Computer viruses are typically spread
through email attachments or webpages that are downloaded on the internet. If virus got a
chance to penetrate into the network of the JKL Company, it may interfere with the security
settings and steal confidential data like passwords or even delete the data of the company that
are stored on the user drives.
Computer viruses may gain entry into the system of the company and since its
operations comprise of multiple data exchange over the two company sites on a network.
This would create loophole on company network because the chances of downloading data or
sending information are high.
Trojan attack
• The attack happens when the system user executes a malicious code which hides behind a
good program. It is usually spread via emails by the attackers and cab seen as valid email by
other people.
• Since Trojan attack is circulated via email, after entering the system, it may record
password and steal critical data of the organization. The communication and collaboration of
the JKL staff in its two sites encourage Trojan attacks that spread over the corporate network.
Business requirements of JKL Company
• When it comes to securing the company network, the conditions involve a secure internet
gate that would ensure robust cloud security.
• The security strategy would help in mitigating the vulnerability issues of the DNS and the
IP layers. Therefore the company would be able to itself from a ransomware attack.
OVERVIEW OF NETWORK SECURITY 3
• The company also need to develop a strategy for securing emails, a suitable plan for email
is ensuring that end-to-encryption is guaranteed.
Security threats
Security tools that JKL Company may use to mitigate security issues
Nessus tool
Nessus is a vulnerability scanner that was created by Tenable Network Security.
Nessus is used to scan computers remotely and raises a concern when it discovers a
vulnerability that malevolent hackers may use to access computers that are connected to a
network. Currently, Nessus is among the trusted security tool that most of the organizations
in the world use to scan security issues and to also get a good standard for vulnerability
evaluation. Nessus is now neither free or an open source, it cost around $ 2,000 per year
(Coffey, Smith, Maglaras & Janicke, 2018).
Hydra tool
Hydra is a security tool that is used to detect, but it can be utilized in various
categories of situation that includes authentication based forms which are commonly applied
in web applications (Peng, Luo, Zhao, Cheng & Liu, 2018). When you require to carry out a
brute force attack, hydra tool is the best tool that will assist a lot.
• The company also need to develop a strategy for securing emails, a suitable plan for email
is ensuring that end-to-encryption is guaranteed.
Security threats
Security tools that JKL Company may use to mitigate security issues
Nessus tool
Nessus is a vulnerability scanner that was created by Tenable Network Security.
Nessus is used to scan computers remotely and raises a concern when it discovers a
vulnerability that malevolent hackers may use to access computers that are connected to a
network. Currently, Nessus is among the trusted security tool that most of the organizations
in the world use to scan security issues and to also get a good standard for vulnerability
evaluation. Nessus is now neither free or an open source, it cost around $ 2,000 per year
(Coffey, Smith, Maglaras & Janicke, 2018).
Hydra tool
Hydra is a security tool that is used to detect, but it can be utilized in various
categories of situation that includes authentication based forms which are commonly applied
in web applications (Peng, Luo, Zhao, Cheng & Liu, 2018). When you require to carry out a
brute force attack, hydra tool is the best tool that will assist a lot.
OVERVIEW OF NETWORK SECURITY 4
Task perform by security tools
Nessus
Nessus uses the common exposures and vulnerabilities architecture for ease of linking
the compliant devices for security. Nessus uses Nessus Attack Scripting Language (NASL),
this is a language that states the individual potential attacks or threats. It also helps in
identifying and fixing vulnerabilities. To use Nessus one would be required to download and
install it on a computer (Antrobus, Green, Frey & Rashid, 2019). The process may take about
5 minutes, and it has a free trial for some time before purchasing the package.
Screenshot for a network scan through Nessus scanner
Hydra solution
This is a tool for penetration testing that is used to crack the login details. Hydra
support many protocols and it is fast and flexible.
Hydra assist the security researchers and security consultants to know how an intruder
may access the network from remote location.
The solution that has been created by kali Linux contain several tools like password
inspector which read and evaluate password and determine the ones that meet the
minimum requirements.
Task perform by security tools
Nessus
Nessus uses the common exposures and vulnerabilities architecture for ease of linking
the compliant devices for security. Nessus uses Nessus Attack Scripting Language (NASL),
this is a language that states the individual potential attacks or threats. It also helps in
identifying and fixing vulnerabilities. To use Nessus one would be required to download and
install it on a computer (Antrobus, Green, Frey & Rashid, 2019). The process may take about
5 minutes, and it has a free trial for some time before purchasing the package.
Screenshot for a network scan through Nessus scanner
Hydra solution
This is a tool for penetration testing that is used to crack the login details. Hydra
support many protocols and it is fast and flexible.
Hydra assist the security researchers and security consultants to know how an intruder
may access the network from remote location.
The solution that has been created by kali Linux contain several tools like password
inspector which read and evaluate password and determine the ones that meet the
minimum requirements.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
OVERVIEW OF NETWORK SECURITY 5
Lines of codes in brute force attack implementation through hydra
Recommendation for the best tool that can be adopted in JKL Company
The best security tool I will recommend the company to use is Nessus, this is because
it is very easy to install and execute, and it also comes in variety of products which
offer alternatives to many security issues (Visoottiviseth, Akarasiriwong, Chaiyasart
& Chotivatunyu, 2017).
The only disadvantage of Hydra solution is that it is very complex becomes it needs
knowledge of running codes when testing, hence it is only suitable to people with
skills and knowledge of programming.
Lines of codes in brute force attack implementation through hydra
Recommendation for the best tool that can be adopted in JKL Company
The best security tool I will recommend the company to use is Nessus, this is because
it is very easy to install and execute, and it also comes in variety of products which
offer alternatives to many security issues (Visoottiviseth, Akarasiriwong, Chaiyasart
& Chotivatunyu, 2017).
The only disadvantage of Hydra solution is that it is very complex becomes it needs
knowledge of running codes when testing, hence it is only suitable to people with
skills and knowledge of programming.
OVERVIEW OF NETWORK SECURITY 6
References
Antrobus, R., Green, B., Frey, S. A. F., & Rashid, A. (2019). The Forgotten I in IIoT:
A Vulnerability Scanner for Industrial Internet of Things.
Coffey, K., Smith, R., Maglaras, L., & Janicke, H. (2018). Vulnerability analysis of
network scanning on SCADA systems. Security and Communication
Networks, 2018.
Peng, Z., Luo, X., Zhao, F., Cheng, Q., & Liu, F. (2018). Hydra-Bite: Static Taint
Immunity, Split, and Complot Based Information Capture Method for Android
Device. Wireless Communications and Mobile Computing, 2018.
Visoottiviseth, V., Akarasiriwong, P., Chaiyasart, S., & Chotivatunyu, S. (2017,
November). PENTOS: Penetration testing tool for Internet of Thing devices.
In TENCON 2017-2017 IEEE Region 10 Conference (pp. 2279-2284). IEEE.
References
Antrobus, R., Green, B., Frey, S. A. F., & Rashid, A. (2019). The Forgotten I in IIoT:
A Vulnerability Scanner for Industrial Internet of Things.
Coffey, K., Smith, R., Maglaras, L., & Janicke, H. (2018). Vulnerability analysis of
network scanning on SCADA systems. Security and Communication
Networks, 2018.
Peng, Z., Luo, X., Zhao, F., Cheng, Q., & Liu, F. (2018). Hydra-Bite: Static Taint
Immunity, Split, and Complot Based Information Capture Method for Android
Device. Wireless Communications and Mobile Computing, 2018.
Visoottiviseth, V., Akarasiriwong, P., Chaiyasart, S., & Chotivatunyu, S. (2017,
November). PENTOS: Penetration testing tool for Internet of Thing devices.
In TENCON 2017-2017 IEEE Region 10 Conference (pp. 2279-2284). IEEE.
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.