Cybersecurity Threats and Defense Strategies
VerifiedAdded on 2020/02/24
|13
|3545
|119
AI Summary
This cybersecurity assignment delves into the complexities of cyber threats, encompassing DDoS attacks, profiling techniques used by malicious actors, and security measures employed to mitigate these risks. It investigates the efficacy of different encryption algorithms, analyzes public-key cryptography's role in securing communications, and examines the application of changepoint detection methods for anomaly detection in computer networks. The assignment encourages students to understand the evolving landscape of cybersecurity threats and evaluate effective defense strategies.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SECURITY IN INFORMATION TECHNOLOGY
Security in Information Technology
Name of the Student:
Name of the University:
Author Note:
Security in Information Technology
Name of the Student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SECURITY IN INFORMATION TECHNOLOGY
Cryptography is a process using which information can be converted into a format
that cannot be read normally. The purpose of cryptography is to conceal any secret message
from any unwanted viewer and only the intended recipient will be provided with the method
to convert it to readable text (Stallings & Tahiliani, 2014).A data that can be read and
understood without the involvement of any special technique is known as plaintext. The
method of masking a plaintext with the intention to hide its contents is called
encryption.Encryption of a plaintext results in an unreadable format known as
ciphertext.Symmetric key encryption is a type of cryptography method that involves the
sharing of a secret key to encrypt and decrypt the data (Agrawal & Mishra, 2012). Symmetric
encryption algorithms have high efficiency in processing large amounts of information and
computationally less intensive compared to the process of asymmetric encryption
algorithm.Stream ciphers and block ciphers are the two types of symmetric key encryption
algorithm that provides bit-by-bit and block encryption respectively. Data Encryption
Standard (DES), Triple Data Encryption Standard (3DES), Advanced Encryption Standard
(AES) and BLOWFISH are examples of various symmetric key algorithms (Surya & Diviya,
2012).
Public Key Encryption also known as Asymmetric Encryption is a type of
Cryptography that employs two keys for the process of encrypting and decrypting a data.One
key is used for the encryption of a data; however, it cannot be used for decrypting the
encrypted data. Similarly, another key is used for decrypting the data, which cannot be used
for encrypting the same (Wee, 2012). The two keys are public key and private key. Public
key is used for encrypting the data and is in possession of both the sender and the recipient
while the private key is possessed only by the receiver of the message. To decrypt an
encrypted message the recipient will require using both the public and private key.The public
key is open to all however, it alone cannot be used to decrypt the coded message (Hofheinz &
Cryptography is a process using which information can be converted into a format
that cannot be read normally. The purpose of cryptography is to conceal any secret message
from any unwanted viewer and only the intended recipient will be provided with the method
to convert it to readable text (Stallings & Tahiliani, 2014).A data that can be read and
understood without the involvement of any special technique is known as plaintext. The
method of masking a plaintext with the intention to hide its contents is called
encryption.Encryption of a plaintext results in an unreadable format known as
ciphertext.Symmetric key encryption is a type of cryptography method that involves the
sharing of a secret key to encrypt and decrypt the data (Agrawal & Mishra, 2012). Symmetric
encryption algorithms have high efficiency in processing large amounts of information and
computationally less intensive compared to the process of asymmetric encryption
algorithm.Stream ciphers and block ciphers are the two types of symmetric key encryption
algorithm that provides bit-by-bit and block encryption respectively. Data Encryption
Standard (DES), Triple Data Encryption Standard (3DES), Advanced Encryption Standard
(AES) and BLOWFISH are examples of various symmetric key algorithms (Surya & Diviya,
2012).
Public Key Encryption also known as Asymmetric Encryption is a type of
Cryptography that employs two keys for the process of encrypting and decrypting a data.One
key is used for the encryption of a data; however, it cannot be used for decrypting the
encrypted data. Similarly, another key is used for decrypting the data, which cannot be used
for encrypting the same (Wee, 2012). The two keys are public key and private key. Public
key is used for encrypting the data and is in possession of both the sender and the recipient
while the private key is possessed only by the receiver of the message. To decrypt an
encrypted message the recipient will require using both the public and private key.The public
key is open to all however, it alone cannot be used to decrypt the coded message (Hofheinz &
2SECURITY IN INFORMATION TECHNOLOGY
Jager, 2012). Therefore, the encryption is secure. Both the public and private keys are based
on very lengthy prime numbers. There is almost infinite amount of prime numbers available,
which creates an infinite amount of possibility for creating such keys. This enhances the
security of the system extremely.An example can be cited in support of the topic mentioned
above. Suppose a person A sends an encrypted data to person B. A encrypts the data with a
public key and sends the data to B with the key (Hsu, Yang & Hwang, 2013). B already has
the private key to decode the data in possession and after receiving the package decodes the
data using both the public and private key. Any intermediate viewer can see the package
however; will be unable to decode the data, as they do not possess both the public as well as
the private key (Jeeva, Palanisamy & Kanagaram, 2012).
The term hashing typically means the process of reducing any object from its original
dimension. In technological perspective, hashing signifies the conversion of a string
characters into a smaller value or key of fixed length that represents the original string.The
purpose of hashing is to summarise and retrieve items in a database, as it is a quicker process
to locate the object using the shorter key than to find it using the original value. Hashing finds
its utility in many encryption algorithms as well (Park et al., 2012).
All the techniques mentioned above are encryption techniques that are used for
maintaining confidentiality and authentication. However, the public key encryption method is
best suited to maintain confidentiality and authentication as it has two encryption keys
involved in the process of encryption and decryption that uses a long set of prime numbers.
This method increases the complexity level of encryption thereby enhancing the security of
the confidential data.
Jager, 2012). Therefore, the encryption is secure. Both the public and private keys are based
on very lengthy prime numbers. There is almost infinite amount of prime numbers available,
which creates an infinite amount of possibility for creating such keys. This enhances the
security of the system extremely.An example can be cited in support of the topic mentioned
above. Suppose a person A sends an encrypted data to person B. A encrypts the data with a
public key and sends the data to B with the key (Hsu, Yang & Hwang, 2013). B already has
the private key to decode the data in possession and after receiving the package decodes the
data using both the public and private key. Any intermediate viewer can see the package
however; will be unable to decode the data, as they do not possess both the public as well as
the private key (Jeeva, Palanisamy & Kanagaram, 2012).
The term hashing typically means the process of reducing any object from its original
dimension. In technological perspective, hashing signifies the conversion of a string
characters into a smaller value or key of fixed length that represents the original string.The
purpose of hashing is to summarise and retrieve items in a database, as it is a quicker process
to locate the object using the shorter key than to find it using the original value. Hashing finds
its utility in many encryption algorithms as well (Park et al., 2012).
All the techniques mentioned above are encryption techniques that are used for
maintaining confidentiality and authentication. However, the public key encryption method is
best suited to maintain confidentiality and authentication as it has two encryption keys
involved in the process of encryption and decryption that uses a long set of prime numbers.
This method increases the complexity level of encryption thereby enhancing the security of
the confidential data.
3SECURITY IN INFORMATION TECHNOLOGY
Denial-of-Service or DoS is a form of cyberattack that is carried out on any personal
or organisational network. The purpose of this type of attack generally is not to expose or
retrieve any type of confidential information from the network; rather it is used to cause a
great deal of issue for the users in a network. A DoS attack uses the technique of flooding a
network with requests that increases the traffic of the network. This results in slow network
connection and websites failing to load properly (Gunasekhar et al., 2014). In an
organisation, a DoS attack can clod the network because of which, the employees in the
organisation will be unable to access any web services to perform organisational operation.
The DoS is effective in rendering the services of an organisation offline that can cause loss in
business and negative publicity of the same. A DoS attack is almost impossible to stop
occurring in an organisation, especially the advanced DDoS (Distributed Denial of Service)
attack that is botnet-driven. It is almost impossible to identify an infected request from a
legitimate request as these requests often use the same protocols or ports and may have
resemblance to a legitimate request in respect to its content.However, some precautions can
be taken to prevent DoS attacks in an organisation (Durcekova, Schwartz & Shahmehri,
2012).
The organisation can purchase a lot of bandwidth. It is an expensive process
though but is the simplest process as well. Implementing a lot of bandwidth, the
organisation will create a situation where the attacker will face difficulties in
carrying out a successful DoS attack. This is because the more bandwidth a
network has the more the attacker must clog by flooding with requests
(Malekzadeh, Ghani & Subramaniam, 2012).
Another method of precaution is using DoS attack identification and detection
techniques like wavelet-based signal analysis, activity profiling and change-point
detection that will help to recognise a malicious traffic from a legitimate one. In
Denial-of-Service or DoS is a form of cyberattack that is carried out on any personal
or organisational network. The purpose of this type of attack generally is not to expose or
retrieve any type of confidential information from the network; rather it is used to cause a
great deal of issue for the users in a network. A DoS attack uses the technique of flooding a
network with requests that increases the traffic of the network. This results in slow network
connection and websites failing to load properly (Gunasekhar et al., 2014). In an
organisation, a DoS attack can clod the network because of which, the employees in the
organisation will be unable to access any web services to perform organisational operation.
The DoS is effective in rendering the services of an organisation offline that can cause loss in
business and negative publicity of the same. A DoS attack is almost impossible to stop
occurring in an organisation, especially the advanced DDoS (Distributed Denial of Service)
attack that is botnet-driven. It is almost impossible to identify an infected request from a
legitimate request as these requests often use the same protocols or ports and may have
resemblance to a legitimate request in respect to its content.However, some precautions can
be taken to prevent DoS attacks in an organisation (Durcekova, Schwartz & Shahmehri,
2012).
The organisation can purchase a lot of bandwidth. It is an expensive process
though but is the simplest process as well. Implementing a lot of bandwidth, the
organisation will create a situation where the attacker will face difficulties in
carrying out a successful DoS attack. This is because the more bandwidth a
network has the more the attacker must clog by flooding with requests
(Malekzadeh, Ghani & Subramaniam, 2012).
Another method of precaution is using DoS attack identification and detection
techniques like wavelet-based signal analysis, activity profiling and change-point
detection that will help to recognise a malicious traffic from a legitimate one. In
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4SECURITY IN INFORMATION TECHNOLOGY
such process, the first task is to determine the accurate moment of the attack. This
is possible by using activity-profiling technique that helps to calculate the average
rate of traffic and marks significant increase in the traffic rate.An organization that
can detect a DoS attack can also determine the type of DoS attack that is going to
be carried out on the organization (Fachkha et al., 2012). Another robust
mechanism for the detection of a DoS attack is Change-Point Detection or
Change-Point Monitoring (CPM) system.A CPM uses the inbuilt protocol
behaviours for detecting a DoS attack. CPM is not dependent on traffic flow rates
or specific applications as the protocol behaviours are identified exclusively by
the specifications of the protocol and the service models of Internet applications
(Tartakovsky, Polunchenko & Sokolov, 2013). CPM is not sensitive to traffic
patterns and sites as it relies on the non-parametric CUSUM method, thus
resulting in a robust CPM, making it much more generally applicable and an
easier deployment.CPM plays a dual role in detection of DoS attacks, the first
mile CPM and the last mile CPM. As the first mile CPM has proximity to the
sources of flooding, it alarms about the ongoing DoS attack and helps to reveal the
source from which the flooding is being originated. The simplicity of CPM is due
to its low computation overhead and statelessness (Tartakovsky, Nikiforov &
Basseville, 2014).
The last and the most obvious method of precaution from DoS attacks is
implementing strong and sophisticated firewall in the network along with other
Network Security Software that may be able to detect or warn before the
occurrence of a DoS attack in the organisation (Raiyn, 2014).
such process, the first task is to determine the accurate moment of the attack. This
is possible by using activity-profiling technique that helps to calculate the average
rate of traffic and marks significant increase in the traffic rate.An organization that
can detect a DoS attack can also determine the type of DoS attack that is going to
be carried out on the organization (Fachkha et al., 2012). Another robust
mechanism for the detection of a DoS attack is Change-Point Detection or
Change-Point Monitoring (CPM) system.A CPM uses the inbuilt protocol
behaviours for detecting a DoS attack. CPM is not dependent on traffic flow rates
or specific applications as the protocol behaviours are identified exclusively by
the specifications of the protocol and the service models of Internet applications
(Tartakovsky, Polunchenko & Sokolov, 2013). CPM is not sensitive to traffic
patterns and sites as it relies on the non-parametric CUSUM method, thus
resulting in a robust CPM, making it much more generally applicable and an
easier deployment.CPM plays a dual role in detection of DoS attacks, the first
mile CPM and the last mile CPM. As the first mile CPM has proximity to the
sources of flooding, it alarms about the ongoing DoS attack and helps to reveal the
source from which the flooding is being originated. The simplicity of CPM is due
to its low computation overhead and statelessness (Tartakovsky, Nikiforov &
Basseville, 2014).
The last and the most obvious method of precaution from DoS attacks is
implementing strong and sophisticated firewall in the network along with other
Network Security Software that may be able to detect or warn before the
occurrence of a DoS attack in the organisation (Raiyn, 2014).
5SECURITY IN INFORMATION TECHNOLOGY
Some rules are required to be followed while working in secure areas as the protection
and privacy of the area should be of the utmost priority. The following is a list of some rules
that is necessary to be followed:
The organisation shall manage the activities of every individual who enter an
important area such as computer rooms, control centres, data storage rooms and
important server locations (Peltier, 2016).
The organisation must prohibit access of any media that uses an external interface
connection within a secret area without a prior legitimate approval provided by the
accreditation authority (Peltier, 2016).
The organisation should prohibit the access of any media that uses an external
interface connection in a top-secret area without in possession of a written
authorisation from the accreditation authority (Peltier, 2016).
The areas that have special sensitive sectors should be designated with proper
symbols and have tight security deployed in all entry and exit points that leads to the
secure area (Peltier, 2016).
The behaviour of the personnel on premises of restricted areas should be governed by
formal policies or guidelines that should include prohibition of eating, drinking and
smoking; rules regarding usage of devices that generate radio frequency such as cell
phones near sensitive equipment and when can storage devices be used (Peltier,
2016).
Methodologies regarding working in secure areas shall be properly designed and
applied (Peltier, 2016).
Secure working areas must have physical protection. Possible measures include
facilitating the personnel with the knowledge of the operations inside a secure facility
Some rules are required to be followed while working in secure areas as the protection
and privacy of the area should be of the utmost priority. The following is a list of some rules
that is necessary to be followed:
The organisation shall manage the activities of every individual who enter an
important area such as computer rooms, control centres, data storage rooms and
important server locations (Peltier, 2016).
The organisation must prohibit access of any media that uses an external interface
connection within a secret area without a prior legitimate approval provided by the
accreditation authority (Peltier, 2016).
The organisation should prohibit the access of any media that uses an external
interface connection in a top-secret area without in possession of a written
authorisation from the accreditation authority (Peltier, 2016).
The areas that have special sensitive sectors should be designated with proper
symbols and have tight security deployed in all entry and exit points that leads to the
secure area (Peltier, 2016).
The behaviour of the personnel on premises of restricted areas should be governed by
formal policies or guidelines that should include prohibition of eating, drinking and
smoking; rules regarding usage of devices that generate radio frequency such as cell
phones near sensitive equipment and when can storage devices be used (Peltier,
2016).
Methodologies regarding working in secure areas shall be properly designed and
applied (Peltier, 2016).
Secure working areas must have physical protection. Possible measures include
facilitating the personnel with the knowledge of the operations inside a secure facility
6SECURITY IN INFORMATION TECHNOLOGY
on a need-to-know basis; the operations in secure sectors should be supervised and
vacant secure areas should be locked as well as checked periodically (Peltier, 2016).
Only those personnel who have legitimate authorisation should be permitted access to
places that stores sensitive information such as a computer room or a data storage
room (Peltier, 2016).
The computerised operations should be kept by the organisation in a secure area with
access restriction. Unauthorised personnel must be denied access by the organisation
with the use of restricted areas, security rooms and locked doors (Peltier, 2016).
Restricted areas may be created for the protection of sensitive and confidential
information in open areas during working shifts. The restricted areas must be clearly
marked and any unauthorised access to these locations must be promptly challenged
by the personnel who are working in the restricted area (Peltier, 2016).
The organisation must limit controlled area access to only authorised personnel during
criminal justice information processing times (Peltier, 2016).
The organisations personnel policies should be obtained and reviewed to analyse and
assess the methods and controls over recruiting new employees (Peltier, 2016).
A procedure must be implemented that specifies about who can authorise personnel
work in locations where ePHI might be accessed (Peltier, 2016).
The trash bins that are used in an organisation can transform to a valuable information
centre for industrial spies seeking company secrets to utilise them for benefits. Industrial
competitors are always on the look-out for sensitive information of their rivals, which may
drop in their lap in the form of a crumpled paper thrown away carelessly by an employee of
the rival company into a trash bin that is rummaged and retrieved by an industrial spy in
disguise of a sweeper (Benny, 2013). There are many instances of such incidents where an
employee of an organisation threw away a paper containing sensitive company data
on a need-to-know basis; the operations in secure sectors should be supervised and
vacant secure areas should be locked as well as checked periodically (Peltier, 2016).
Only those personnel who have legitimate authorisation should be permitted access to
places that stores sensitive information such as a computer room or a data storage
room (Peltier, 2016).
The computerised operations should be kept by the organisation in a secure area with
access restriction. Unauthorised personnel must be denied access by the organisation
with the use of restricted areas, security rooms and locked doors (Peltier, 2016).
Restricted areas may be created for the protection of sensitive and confidential
information in open areas during working shifts. The restricted areas must be clearly
marked and any unauthorised access to these locations must be promptly challenged
by the personnel who are working in the restricted area (Peltier, 2016).
The organisation must limit controlled area access to only authorised personnel during
criminal justice information processing times (Peltier, 2016).
The organisations personnel policies should be obtained and reviewed to analyse and
assess the methods and controls over recruiting new employees (Peltier, 2016).
A procedure must be implemented that specifies about who can authorise personnel
work in locations where ePHI might be accessed (Peltier, 2016).
The trash bins that are used in an organisation can transform to a valuable information
centre for industrial spies seeking company secrets to utilise them for benefits. Industrial
competitors are always on the look-out for sensitive information of their rivals, which may
drop in their lap in the form of a crumpled paper thrown away carelessly by an employee of
the rival company into a trash bin that is rummaged and retrieved by an industrial spy in
disguise of a sweeper (Benny, 2013). There are many instances of such incidents where an
employee of an organisation threw away a paper containing sensitive company data
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7SECURITY IN INFORMATION TECHNOLOGY
carelessly into the wastebasket of the office that caused heavy loss to the company. Due to
recent security conditions, every organisation is spending a fortune in cranking up the
security measures. However, all the efforts are going to trash due to such insensitive acts.
There is however, some procedure that can protect a trash bin of one company from
becoming the winning trophy of its rival (Bhatti & Alymenko, 2017).
Paper Shredders are machines that can be used to destroy company documents
completely that are not needed by the company instead of discarding them to the bin.This is a
very effective process that will protect a company from losing any of its documents to the
world even if it is not required by the company. There are some organisations like the Data
Destruction Services Inc. in Boston run by Dick Hannon, who takes orders from
organisations who wishes to destroy some of their documents and deploy vans equipped with
paper shredder machines at their location to destroy the documents (Bhatti & Alymenko,
2017).
To reduce the risk of desktop PC theft, individual desktop PCs in organisations can be
securely locked onto their desktops with a cable, if there is something on the desk to wrap the
cable around. In addition, each PC should have a login screen that requires a complex
passcode and a screensaver so that an intruder can be restricted from unauthorised access and
use to the system (Bhatti & Alymenko, 2017).
carelessly into the wastebasket of the office that caused heavy loss to the company. Due to
recent security conditions, every organisation is spending a fortune in cranking up the
security measures. However, all the efforts are going to trash due to such insensitive acts.
There is however, some procedure that can protect a trash bin of one company from
becoming the winning trophy of its rival (Bhatti & Alymenko, 2017).
Paper Shredders are machines that can be used to destroy company documents
completely that are not needed by the company instead of discarding them to the bin.This is a
very effective process that will protect a company from losing any of its documents to the
world even if it is not required by the company. There are some organisations like the Data
Destruction Services Inc. in Boston run by Dick Hannon, who takes orders from
organisations who wishes to destroy some of their documents and deploy vans equipped with
paper shredder machines at their location to destroy the documents (Bhatti & Alymenko,
2017).
To reduce the risk of desktop PC theft, individual desktop PCs in organisations can be
securely locked onto their desktops with a cable, if there is something on the desk to wrap the
cable around. In addition, each PC should have a login screen that requires a complex
passcode and a screensaver so that an intruder can be restricted from unauthorised access and
use to the system (Bhatti & Alymenko, 2017).
8SECURITY IN INFORMATION TECHNOLOGY
Intrusion Detection System of a firewall uses two types of filtering namely Deep
Packet Inspection and Packet Stream Analysis.
Deep Packet Inspection abbreviated as DPI is a method of packet filtering whose zone
of operation is in the application layer of the Open Systems Interconnection (OSI) reference
model. DPI makes it possible to locate, recognise, differentiate, reroute or block packets with
particular code or data that typical packet filtering tools fail to identify as they are tasked to
examine only packet headers. Communication Service providers use DPI to allocate the
resources that are available to them to achieve a streamlined flow of traffic (Antonello et al.,
2012). An example can be cited in support of the topic discussed above. A message is tagged
as high priority that can be routed to its destination before the pending less important or low
priority data packets that are involved in ordinary internet browsing. DPI can be utilised
further for speeding up transfer of data to avoid P2P abuse, enhancing the experience of most
subscribers by improving the performance of the network. Many security implications are
there of using DPI as the technology enables to recognise the original source as well as the
recipient of content that contains specific packets (Antonello et al., 2012).
A packet stream are basically fragmented parts of a message or data that is broken
down into small bits, each of which contains part of the complete information that is present
in the whole packet. The packet is broken down in such a way that at the receiving end it can
be reassembled to its original form and the information within the packet is not damaged
(Sanders, 2017).
The process of analysing a packet stream within a network for possible malicious
contents or detection of intrusion is called packet stream analysis. It is a basic method of
monitoring a network. Many network packet analyser-tools are there that monitor all the
incoming and outgoing packets in a network link and capture these packets to inspect for any
Intrusion Detection System of a firewall uses two types of filtering namely Deep
Packet Inspection and Packet Stream Analysis.
Deep Packet Inspection abbreviated as DPI is a method of packet filtering whose zone
of operation is in the application layer of the Open Systems Interconnection (OSI) reference
model. DPI makes it possible to locate, recognise, differentiate, reroute or block packets with
particular code or data that typical packet filtering tools fail to identify as they are tasked to
examine only packet headers. Communication Service providers use DPI to allocate the
resources that are available to them to achieve a streamlined flow of traffic (Antonello et al.,
2012). An example can be cited in support of the topic discussed above. A message is tagged
as high priority that can be routed to its destination before the pending less important or low
priority data packets that are involved in ordinary internet browsing. DPI can be utilised
further for speeding up transfer of data to avoid P2P abuse, enhancing the experience of most
subscribers by improving the performance of the network. Many security implications are
there of using DPI as the technology enables to recognise the original source as well as the
recipient of content that contains specific packets (Antonello et al., 2012).
A packet stream are basically fragmented parts of a message or data that is broken
down into small bits, each of which contains part of the complete information that is present
in the whole packet. The packet is broken down in such a way that at the receiving end it can
be reassembled to its original form and the information within the packet is not damaged
(Sanders, 2017).
The process of analysing a packet stream within a network for possible malicious
contents or detection of intrusion is called packet stream analysis. It is a basic method of
monitoring a network. Many network packet analyser-tools are there that monitor all the
incoming and outgoing packets in a network link and capture these packets to inspect for any
9SECURITY IN INFORMATION TECHNOLOGY
malicious traffic. These tools also provide reconstruction of session that helps to understand
the exact problem of the network.
Apart from the packet header, most of the network data is binary trash. A large
amount of processing power is required to extract the true meaningful information out of a
network session. It multiplies to an exponential rate if the data is encrypted. More analysis
requires implementation of hardware, which in turn requires higher expense of cost. That is
why a true network analysis is processing intensive and tough on the analyst (Sanders, 2017).
malicious traffic. These tools also provide reconstruction of session that helps to understand
the exact problem of the network.
Apart from the packet header, most of the network data is binary trash. A large
amount of processing power is required to extract the true meaningful information out of a
network session. It multiplies to an exponential rate if the data is encrypted. More analysis
requires implementation of hardware, which in turn requires higher expense of cost. That is
why a true network analysis is processing intensive and tough on the analyst (Sanders, 2017).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10SECURITY IN INFORMATION TECHNOLOGY
References
Agrawal, M., & Mishra, P. (2012). A comparative survey on symmetric key encryption
techniques. International Journal on Computer Science and Engineering, 4(5), 877.
Antonello, R., Fernandes, S., Kamienski, C., Sadok, D., Kelner, J., GóDor, I., ... &
Westholm, T. (2012). Deep packet inspection tools and techniques in commodity
platforms: Challenges and trends. Journal of Network and Computer Applications,
35(6), 1863-1878.
Benny, D. J. (2013). Industrial espionage: Developing a counterespionage program. Crc
Press.
Bhatti, H. J., & Alymenko, A. (2017). A Literature Review: Industrial Espionage.
Durcekova, V., Schwartz, L., & Shahmehri, N. (2012, May). Sophisticated denial of service
attacks aimed at application layer. In ELEKTRO, 2012 (pp. 55-60). IEEE.
Fachkha, C., Bou-Harb, E., Boukhtouta, A., Dinh, S., Iqbal, F., & Debbabi, M. (2012,
October). Investigating the dark cyberspace: Profiling, threat-based analysis and
correlation. In Risk and Security of Internet and Systems (CRiSIS), 2012 7th
International Conference on (pp. 1-8). IEEE.
Gunasekhar, T., Rao, K. T., Saikiran, P., & Lakshmi, P. S. (2014). A survey on denial of
service attacks.
Hofheinz, D., & Jager, T. (2012, August). Tightly Secure Signatures and Public-Key
Encryption. In Crypto (Vol. 7417, pp. 590-607).
Hsu, S. T., Yang, C. C., & Hwang, M. S. (2013). A Study of Public Key Encryption with
Keyword Search. IJ Network Security, 15(2), 71-79.
References
Agrawal, M., & Mishra, P. (2012). A comparative survey on symmetric key encryption
techniques. International Journal on Computer Science and Engineering, 4(5), 877.
Antonello, R., Fernandes, S., Kamienski, C., Sadok, D., Kelner, J., GóDor, I., ... &
Westholm, T. (2012). Deep packet inspection tools and techniques in commodity
platforms: Challenges and trends. Journal of Network and Computer Applications,
35(6), 1863-1878.
Benny, D. J. (2013). Industrial espionage: Developing a counterespionage program. Crc
Press.
Bhatti, H. J., & Alymenko, A. (2017). A Literature Review: Industrial Espionage.
Durcekova, V., Schwartz, L., & Shahmehri, N. (2012, May). Sophisticated denial of service
attacks aimed at application layer. In ELEKTRO, 2012 (pp. 55-60). IEEE.
Fachkha, C., Bou-Harb, E., Boukhtouta, A., Dinh, S., Iqbal, F., & Debbabi, M. (2012,
October). Investigating the dark cyberspace: Profiling, threat-based analysis and
correlation. In Risk and Security of Internet and Systems (CRiSIS), 2012 7th
International Conference on (pp. 1-8). IEEE.
Gunasekhar, T., Rao, K. T., Saikiran, P., & Lakshmi, P. S. (2014). A survey on denial of
service attacks.
Hofheinz, D., & Jager, T. (2012, August). Tightly Secure Signatures and Public-Key
Encryption. In Crypto (Vol. 7417, pp. 590-607).
Hsu, S. T., Yang, C. C., & Hwang, M. S. (2013). A Study of Public Key Encryption with
Keyword Search. IJ Network Security, 15(2), 71-79.
11SECURITY IN INFORMATION TECHNOLOGY
Jeeva, A. L., Palanisamy, D. V., & Kanagaram, K. (2012). Comparative analysis of
performance efficiency and security measures of some encryption algorithms.
International Journal of Engineering Research and Applications (IJERA), 2(3), 3033-
3037.
Malekzadeh, M., Ghani, A. A. A., & Subramaniam, S. (2012). A new security model to
prevent denial‐of‐service attacks and violation of availability in wireless networks.
International Journal of Communication Systems, 25(7), 903-925.
Park, P., Yoo, S., Choi, S. I., Park, J., Ryu, H. Y., & Ryou, J. (2012). A Pseudo State-Based
Distributed DoS Detection Mechanism Using Dynamic Hashing. In Computer
Applications for Security, Control and System Engineering (pp. 22-29). Springer,
Berlin, Heidelberg.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. CRC Press.
Raiyn, J. (2014). A survey of cyber attack detection strategies. International Journal of
Security and Its Applications, 8(1), 247-256.
Sanders, C. (2017). Practical packet analysis: Using Wireshark to solve real-world network
problems. No Starch Press.
Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and
practice (Vol. 6). London: Pearson.
Surya, E., & Diviya, C. (2012). A Survey on Symmetric Key Encryption Algorithms.
International Journal of Computer Science & Communication Networks, 2(4), 475-
477.
Jeeva, A. L., Palanisamy, D. V., & Kanagaram, K. (2012). Comparative analysis of
performance efficiency and security measures of some encryption algorithms.
International Journal of Engineering Research and Applications (IJERA), 2(3), 3033-
3037.
Malekzadeh, M., Ghani, A. A. A., & Subramaniam, S. (2012). A new security model to
prevent denial‐of‐service attacks and violation of availability in wireless networks.
International Journal of Communication Systems, 25(7), 903-925.
Park, P., Yoo, S., Choi, S. I., Park, J., Ryu, H. Y., & Ryou, J. (2012). A Pseudo State-Based
Distributed DoS Detection Mechanism Using Dynamic Hashing. In Computer
Applications for Security, Control and System Engineering (pp. 22-29). Springer,
Berlin, Heidelberg.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. CRC Press.
Raiyn, J. (2014). A survey of cyber attack detection strategies. International Journal of
Security and Its Applications, 8(1), 247-256.
Sanders, C. (2017). Practical packet analysis: Using Wireshark to solve real-world network
problems. No Starch Press.
Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and
practice (Vol. 6). London: Pearson.
Surya, E., & Diviya, C. (2012). A Survey on Symmetric Key Encryption Algorithms.
International Journal of Computer Science & Communication Networks, 2(4), 475-
477.
12SECURITY IN INFORMATION TECHNOLOGY
Tartakovsky, A. G., Polunchenko, A. S., & Sokolov, G. (2013). Efficient computer network
anomaly detection by changepoint detection methods. IEEE Journal of Selected
Topics in Signal Processing, 7(1), 4-11.
Tartakovsky, A., Nikiforov, I., & Basseville, M. (2014). Sequential analysis: Hypothesis
testing and changepoint detection. CRC Press.
Wee, H. (2012, May). Public Key Encryption against Related Key Attacks. In Public Key
Cryptography (Vol. 7293, pp. 262-279).
Tartakovsky, A. G., Polunchenko, A. S., & Sokolov, G. (2013). Efficient computer network
anomaly detection by changepoint detection methods. IEEE Journal of Selected
Topics in Signal Processing, 7(1), 4-11.
Tartakovsky, A., Nikiforov, I., & Basseville, M. (2014). Sequential analysis: Hypothesis
testing and changepoint detection. CRC Press.
Wee, H. (2012, May). Public Key Encryption against Related Key Attacks. In Public Key
Cryptography (Vol. 7293, pp. 262-279).
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.