Friday, October 18, 2019

ECT Assignment Example | Topics and Well Written Essays - 500 words

ECT - Assignment Example These attacks interrupt a message between two segments of a system by inserting themselves as malicious actors who then impersonates both parties to gain access to information that the two parties are exchanging (Strebe 25). Prevention from MITM attacks include using PKI or public Key Infrastructure, reinforced mutual authentication like secret keys, second channel authentication, and reinforced encryption. Involves ensuring that one’s computer is protected against possibly lethal materials or suspicious software obtained online. Browser security is obtained through simple security tips like deletion of spam, use of password, using firewall, and only opening email attachments deemed safe. DLP is crucial way of protecting susceptible information or data via messaging, endpoints, and web gateways. Effective implementation of DLP involves proactive identification, tracking, and securing sensitive organizational data from all vulnerable points within the organization with little or no effect on employees’ routine and output. I would apply snort in my organization but only on condition that the primary organizational antivirus as a threat or untrusted programs does not perceive it (Strebe 136). The advantage is that all employees will have their computers protected from intrusion on real time basis. Additionally, the administrator can use the traffic analysis and packet logs to trace any intrusion issues on each user’s computer. SYN flood presents attacks that deny services by dominating immense server resources of host thereby preventing the system from being responsive to genuine interchange. Prevention techniques include firewalls and proxies, filtering, SYN cache and cookies, and elevated backlog amongst others. WiMax or Wireless Interoperability for Microwave Access is a convention for communication using set wireless networks with data transfer of up to 49 Mb/s. In data terminals and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.