free college papers, buy college papers, college papers for sale , how to write college papers,
Thursday, November 21, 2019
Cyber Security (Potential Security Threats, Challenges for Hybrid Coursework
Cyber Security (Potential Security Threats, Challenges for Hybrid Cloud Solution, Cyber Security Concerns Associated With Mobile Devices, Nature of Internet Activists) - Coursework Example Some of the internet activist just like hackers tends to disrupt normal online operations of the target organization, in addition to blocking online access to targeted facilities. Moreover, internet activist focus on electronic civil disobedience done by creating partnerships plus coalitions that function independently, for instance the Protest.Net and Action Alert known for posting time and place for movements (Tavani, 2010). Internet Activists utilize the web for the most part in a non-intrusive manner, so as to press on with their grounds in the most proficient manner. That is why they operate websites which provide information regarding matters relatable to their cause, and offer links to sites which are of attention to their cause. In addition, they provide information concerning upcoming events and generally aid non-disruptive activities. For instance, they employ virtual sit-ins plus blockades, in addition to e-mail bombs (Jordan, 2002). Traditional hackers on the other hand use web hacks, computer break-ins, together with the spread of computer viruses plus worms. They attack corporationsââ¬â¢ networks to make use of data for their financial gain, or in some instances for industrial espionage (Gardner & Kobtzeff, 2012). Traditional hackers unlike internet activists, employ more malicious and unsettling motives plus means, such as illegally using user accounts with privileges to run codes, with the intention of damaging and corrupting data, or stealing data plus software so as to stop genuine authorized users. They tend to disrupt normal operations and result in serious damage. However, both make use of certain tactics in particular e-mail spoofing and Distributed Denial of Service attacks on corporations with the intention of damaging the corporationââ¬â¢s public image, such as cracking techniques used for defacing Web sites. For instance, traditional hackers employ attack software, such as Aping@commands that attacked NATO sites during Kosovo war, and they seek to deluge the target server with network packets (Denning, 2002). They are also highly skilled when it comes to network design, and the techniques of avoiding security procedures. But, internet activists emphasize membership through e-mail newsletters, notices, and alerts concerning upcoming events. Both possess the power to interrupt and harm their opposition via electronic measures (National Communications System (U.S.), 2000). Current Monitoring Technologies Used To Detect Intrusions One of the present monitoring technologies applicable for a company that might be a target are the signature based and the anomaly based Network Intrusion Detection Systems (Ghosh, 2010). Such technologies are designed to detect possible intrusions like malicious acts, computer attack or intrusion of a virus. Enormous Network Intrusion Detection Systems server are placed on the links comprising a backbone network, so as to monitor every traffic, a nd the smaller systems are placed to keep an eye on traffic directed to an exact server, gateway, or even a router (Brazier & et tal, 2011). Consequently, the technology alerts the appropriate person upon detection. For instance, the Intrusion Prevention System makes use of high-tech multi-threaded architecture comprising virtual sensors which scales to shield even the most expanse enterprise networks. When it is deployed in conjunction with Security Information and Event Management or with Automatic
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.