This document provides an analysis of security options for JKL Company, including threats and vulnerabilities, business requirements, and recommended security tools.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
OVERVIEW OF NETWORK SECURITY1 Analysis of security options for JKL Company Student’s name University Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
OVERVIEW OF NETWORK SECURITY2 Threats and vulnerabilities facing JKL Company Computer viruses This is programmed to spread to all computers. Computer viruses are typically spread through email attachments or webpages that are downloaded on the internet. If virus got a chance to penetrate into the network of the JKL Company, it may interfere with the security settings and steal confidential data like passwords or even delete the data of the company that are stored on the user drives. Computer viruses may gain entry into the system of the company and since its operations comprise of multiple data exchange over the two company sites on a network. This would create loophole on company network because the chances of downloading data or sending information are high. Trojan attack •The attack happens when the system user executes a malicious code which hides behind a good program. It is usually spread via emails by the attackers and cab seen as valid email by other people. •Since Trojan attack is circulated via email, after entering the system, it may record password and steal critical data of the organization. The communication and collaboration of the JKL staff in its two sites encourage Trojan attacks that spread over the corporate network. Business requirements of JKL Company •When it comes to securing the company network, the conditions involve a secure internet gate that would ensure robust cloud security. •The security strategy would help in mitigating the vulnerability issues of the DNS and the IP layers. Therefore the company would be able to itself from a ransomware attack.
OVERVIEW OF NETWORK SECURITY3 •The company also need to develop a strategy for securing emails, a suitable plan for email is ensuring that end-to-encryption is guaranteed. Security threats Security tools that JKL Company may use to mitigate security issues Nessus tool Nessus is a vulnerability scanner that was created by Tenable Network Security. Nessus is used to scan computers remotely and raises a concern when it discovers a vulnerability that malevolent hackers may use to access computers that are connected to a network. Currently, Nessus is among the trusted security tool that most of the organizations in the world use to scan security issues and to also get a good standard for vulnerability evaluation. Nessus is now neither free or an open source, it cost around $ 2,000 per year (Coffey, Smith, Maglaras & Janicke, 2018). Hydra tool Hydra is a security tool that is used to detect, but it can be utilized in various categories of situation that includes authentication based forms which are commonly applied in web applications (Peng, Luo, Zhao, Cheng & Liu, 2018). When you require to carry out a brute force attack, hydra tool is the best tool that will assist a lot.
OVERVIEW OF NETWORK SECURITY4 Task perform by security tools Nessus Nessus uses the common exposures and vulnerabilities architecture for ease of linking the compliant devices for security. Nessus uses Nessus Attack Scripting Language (NASL), this is a language that states the individual potential attacks or threats. It also helps in identifying and fixing vulnerabilities. To use Nessus one would be required to download and install it on a computer (Antrobus, Green, Frey & Rashid, 2019). The process may take about 5 minutes, and it has a free trial for some time before purchasing the package. Screenshot for a network scan through Nessus scanner Hydra solution This is a tool for penetration testing that is used to crack the login details. Hydra support many protocols and it is fast and flexible. Hydra assist the security researchers and security consultants to know how an intruder may access the network from remote location. The solution that has been created by kali Linux contain several tools like password inspector which read and evaluate password and determine the ones that meet the minimum requirements.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
OVERVIEW OF NETWORK SECURITY5 Lines of codes in brute force attack implementation through hydra Recommendation for the best tool that can be adopted in JKL Company The best security tool I will recommend the company to use is Nessus, this is because it is very easy to install and execute, and it also comes in variety of products which offer alternatives to many security issues (Visoottiviseth, Akarasiriwong, Chaiyasart & Chotivatunyu, 2017). The only disadvantage of Hydra solution is that it is very complex becomes it needs knowledge of running codes when testing, hence it is only suitable to people with skills and knowledge of programming.
OVERVIEW OF NETWORK SECURITY6 References Antrobus, R., Green, B., Frey, S. A. F., & Rashid, A. (2019). The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things. Coffey, K., Smith, R., Maglaras, L., & Janicke, H. (2018). Vulnerability analysis of network scanning on SCADA systems.Security and Communication Networks,2018. Peng, Z., Luo, X., Zhao, F., Cheng, Q., & Liu, F. (2018). Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device.Wireless Communications and Mobile Computing,2018. Visoottiviseth, V., Akarasiriwong, P., Chaiyasart, S., & Chotivatunyu, S. (2017, November). PENTOS: Penetration testing tool for Internet of Thing devices. InTENCON 2017-2017 IEEE Region 10 Conference(pp. 2279-2284). IEEE.