Overview of Network Security and Mitigation Strategies for JKL

Verified

Added on  2022/12/30

|4
|915
|75
Presentation
AI Summary
This presentation analyzes the network security landscape for JKL Company, identifying key threats such as PC infections, Trojan horse attacks, and vulnerabilities stemming from data exchanges between sites. It outlines JKL's business requirements, including secure web portals and email security, and proposes mitigation strategies. The presentation focuses on two software solutions: Nessus, a vulnerability assessment tool, and Hydra, a penetration testing tool. Nessus is recommended for its ease of use and comprehensive security features, while Hydra, involving code execution, is deemed more complex. The presentation details the functionality of both tools, including network scanning with Nessus and brute force attacks with Hydra, and concludes with a comparison of their suitability for JKL Company's needs, emphasizing Nessus as the preferred solution.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: OVERVIEW OF NETWORK SECURITY
OVERVIEW OF NETWORK SECURITY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
OVERVIEW OF NETWORK SECURITY 1
Hi, everyone good morning / good afternoon. Today I am going to analyze the Security
Options for JKL company.
Slide 2: At present the company is facing some security related threats. The PC infections are
modified to spread crosswise over PCs. Much of the time, they are sent as email connections
or downloaded from novel site pages with the mean to contaminate organize gadgets by
utilizing frameworks on the system. In the event that an infection figures out how to infiltrate
JKL's PC organize, they can almost certainly debilitate the security settings, take individual
information, for example, passwords or even erase information put away on clients' drives.
PC infections are probably going to pick up passage into the organization's framework since
the organization's activities include numerous information exchanges between the two
destinations over the system. This makes a helpless escape clause on JKL's system as odds of
sending or downloading information containing an infection are high.
Slide 3: In the third I am going to discuss about the business requirements of JKL company.
JKL's business prerequisites regarding system security incorporate secure web portals which
will give amazing cloud security. JKL additionally needs an email security procedure. A
powerful email security technique should contain inventive risk observing capacities with
start to finish encryption. The cloud security procedure will relieve dangers at the IP and
DNS layers. Along these lines the organization will most likely safeguard against
ransomware and phishing a stage prior.
Slide 4: One of most dangerous security attacks is the Trojan horse attack. This assault
happens when the clients of a framework run a malevolent code which is taking cover behind
a real program. They are frequently spread through email and are exhibited as messages from
recognizable people. They are regularly spread through email and are displayed as messages
from commonplace people. In the wake of accessing the framework, the Trojan pony would
Document Page
2OVERVIEW OF NETWORK SECURITY
then be able to record passwords and take touchy information. Joint effort and
correspondence of staff between the two locales elevates Trojan steed assaults to spread on
JKL's system.
Slide 5: For this project I have selected two software that are Nessus and Hydra. In this slide I
am going to discuss Tools to mitigate the security threats that is by Nessus. Nessus is a
powerlessness evaluation arrangement. The apparatus permits organize overseers toward the
front to effectively and rapidly distinguish and fix vulnerabilities, for example, missing
patches and programming defects that outcome in infection and Trojan pony assaults. Nessus'
legitimate web application examining item offers robotized web application checking.
Through its mechanized filtering highlight, legitimate empowers profoundly computerized
sweeps for steady insurance. It additionally enables the head to effortlessly stipulate the
recurrence and timing limits for mechanized testing.
Slide 6: In this Sixth slide I am going to discuss about Nessus. To utilize Nessus items,
clients need to download and introduce the product on their machines from the Nessus
website page. The procedure takes under five minutes and the items have a free time for
testing for testing before acquiring the whole bundle. When the Nessus programming has
been introduced, it naturally recognizes the dangers and vulnerabilities that emerge in a flash.
Slide 7: A basic network scan through Nessus vulnerability Scanner for security is presented
in the picture where the Vulnerability is also mentioned.
Slide 8: In the 8th slide I am going to discuss Hydra. Hydra is an infiltration testing instrument
that breaks login accreditations. It underpins a few conventions to assault and is very
adaptable and quick. Hydra makes it feasible for security specialists and scientists to feature
how simple one can increase unapproved access to the system remotely. The arrangement
Document Page
3OVERVIEW OF NETWORK SECURITY
created by Kali Linux has a few apparatuses incorporated into its bundle, for example, the
pw-examiner which peruses passwords and prints the ones which meet the prerequisites.
Slide 9: In this slide the topic is The Hydra solution, by running the pw-assessor code, it
restores the quantity of legitimate passwords found. The time taken to recognize the danger
through hydra infiltration relies upon to what extent the code takes to be created and run. It
might take a few hours for complex frameworks or even days. It could likewise be a couple
of minutes for a little scale LAN organize.
Slide 10: The lines of code implementing brute force attack through Hydra is presented in
this slide.
Slide 11: The best security tool that JKL should implement is Nessus. The solution is simpler
to introduce and run and furthermore comes in various items offering options in contrast to a
few security issues. The Hydra solution is very unpredictable since it expects one to run
codes while testing thus fit just for the clients with learning on programming aptitudes.
Slide 12: These are the references I have used. Thank You.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]