Network Defence and Countermeasures: Website and Data Security Report

Verified

Added on  2023/05/31

|3
|529
|308
Report
AI Summary
This report focuses on network defenses and countermeasures, emphasizing website and data security. It highlights the importance of Common Vulnerabilities and Exposures (CVE) support in Intrusion Detection Systems (IDS) for robust database security. The report discusses signature analysis and network baselining for identifying suspicious activities, along with the significance of reviewing packet signatures to prevent external threats and worms. It also covers the role of cryptography in maintaining data security, including the evolution from the Data Encryption Standard (DES) to the Advanced Encryption Standard (AES). Furthermore, the application of hash functions for data verification, the use of encryption algorithms for data authentication, and the function of digital signatures in maintaining data integrity are explored. The report concludes by addressing the vulnerabilities of cryptographic systems and the importance of security measures like Internet Protocol Security (IPSec) for system authentication.
Document Page
NETWORK DEFENCE AND COUNTER MEASURES
Network defence and counter measures
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1NETWORK DEFENCE AND COUNTER MEASURES
The foremost determination of this paper is to focus on the network defences and the
counter measures considering the website and data security.
The Common Vulnerabilities and Exposures(CVE) should be supported in all
Intrusion Detection Systems (IDS) in order to achieved stronger security measures for the
databases which stores larger amount of significant data (Milenkoski et al., 2015). The
networking activities should be checked with the help of the signature analysis. Network
baselining is very much for the identification of the suspicious network activities. The
signature of the packets should be reviewed frequently to stop the improper network traffic
activities like external threats such as the land attacks and false protocol numbers and from
worms like Trojan Horses. The practice of tools such as AD Mutate should be encouraged
considering the advanced development in the field of information technology. The misuse of
the Remote Procedure Calls and the misuse of the CGI vulnerabilities are important for the
maintenance of the website and data security. The data security can be maintained with the
help of the cryptography which can restrict the author to access the data. The encryption
standard was first proposed by IBM in 1976, later advanced encryption standard is proposed
and implemented in all the major industries dealing with raw data. The application of the
hash function is mainly due to the verification of the data which are transferred from one
device to another. The concept of looping exists in the different types of encryption
algorithms such as the block cipher, symmetric algorithm, asymmetric algorithm and stream
cipher as it helps in authentication of the data (Karule & Nagrale, 2016). The hash algorithms
are also used by the digital signatures for the authorisation of the data so that the integrity of
the data in maintained. It can be said that the exchange of the primary key with the secondary
key is one of the most important feature of the digitals signature which can help to maintain
data security and data integrity. The authentication of more than one system is done by
Internet Protocol Security (IPSec) which considers security measures such as SSL and SSH.
The cryptographic systems are also vulnerable to the attacks such as XSL and generator
attacks.
Document Page
2NETWORK DEFENCE AND COUNTER MEASURES
Reference
Karule, K. P., & Nagrale, N. V. (2016). Comparative Analysis of Encryption Algorithms for
Various Types of Data Files for Data Security. International Journal of Scientific
Engineering and Applied Science (IJSEAS)–Volume-2, Issue-2.
Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A., & Payne, B. D. (2015). Evaluating
computer intrusion detection systems: A survey of common practices. ACM
Computing Surveys (CSUR), 48(1), 12.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]