University Network Security Technical Report: Communications Analysis

Verified

Added on  2023/06/08

|8
|396
|52
Report
AI Summary
This technical report focuses on network communications security, addressing the Comodo Certificate Authority fraud hack and various IT security risks faced by organizations, particularly those handling sensitive data. The report identifies key threats such as ransomware, DDoS attacks, spyware, eavesdropping, phishing, data breaches, and threats to digital certificates. It proposes solutions including proper backups, DDoS mitigation techniques, anti-spyware technology, encryption, virtual private networks, disk encryption, and CA recommendations. The report also highlights recommendations for preventing IT security risks, such as using encryption on WAP, hiding SSD, and changing passwords periodically. References to supporting literature are also included. The assignment is for SIT735: Network Communications Security.
Document Page
Communications
Network Security
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The Comodo Certificate Authority Fraud
Hack took place in April, 2011.
An Iranian hacker, duped the digital
certificates of some popular web sites like
Google, Yahoo, Skype and Live.com (Grimes,
R. 2018).
He rooted Comodo as the most trusted
certification authority.
Comodo Certificate Authority
Fraud Hack
Document Page
A contractor maintains clients’ data, who
receive payments from government. There
are various IT risks possible to the privacy
and security of this data (Von Solms and
Van Niekerk 2013).
IT security problem occurs when the
confidentiality of the sensitive data or
information is threatened by any means.
IT Security Problem
Document Page
The most significant IT security risks for this
organization are given below:
Ransomware
DDoS Attacks
Spyware
Eavesdropping
Phishing (0
Data Breaching
Threat to Digital Certificates (Bajdor and
Grabara 2014).
Main IT Security Risks
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The proposed solutions for the risks are given
below:
Ransomware: Proper Backups
DDoS Attacks: DDoS Mitigation Technique
Spyware: Antispyware Technology
Eavesdropping: Encryption (Demir and
Krajewski 2013).
Phishing: Virtual Private Networks
Data Breaching: Disk Encryption
Digital Certificate Threats: Adding CA
Proposed Solutions to
Risks
Document Page
The recommendations for preventing IT
security risks are as follows:
Using Encryption on WAP
Hiding SSD
Changing Passwords Periodically
Recommendations
Document Page
Bajdor, P. and Grabara, I., 2014. The Role of Information
System Flows in Fulfilling Customers’ Individual
Orders. Journal of Studies in Social Sciences, 7(2).
Demir, I. and Krajewski, W.F., 2013. Towards an integrated
flood information system: centralized data access, analysis,
and visualization. Environmental Modelling & Software, 50,
pp.77-84.
Grimes, R. 2018. The real security issue behind the
Comodo hack. [online] CSO Online. Available at:
https://www.csoonline.com/article/2623707/hacking/the-rea
l-security-issue-behind-the-comodo-hack.html
[Accessed 18 Aug. 2018].
Von Solms, R. and Van Niekerk, J., 2013. From information
security to cyber security. computers & security, 38, pp.97-
102.
References
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]