Identifying Potential Malicious Attacks, Threats and Vulnerabilitie

computer science

Description

As the technology is growing at faster rate, the potential threats to technology are also

growing faster than that. So, as to protect an organization from such network security threats severe

actions and several steps have to be taken by network security administrators. Large enterprises are the

most vulnerable to these threats, because these threats not only affects a single person but the

whole organization. These threats can be attack to any resource of an organization such as:

private network, computers and personal business data. The important aspect of any business

organization is to protect an organization from such threats that can make severe damages to the

organization by stealing confidential business data. Within the organization, all the computers and

devices are interconnected in a LAN network or using a WLAN (Wireless Local Area Network) and also

connected to Firewalls, servers and data servers. So, in order to provide security to an

organization several security measures has to be taken, so that security of an organization can not

compromise at any cost. There are several threats that can affect network security of an organization

such as: Wireless Sniffing, Denial of Service, sniffing of VoIP network, trojans and unauthorized access

to FTP server

The security measures has to be taken because there are several ways in which the

network of an organization can attacked and lead to a heavy loss of business data. Network

security administrators has to implement security policies such as to secure its internal as well as

external network from attackers because there are several ways in which an attacker can sniff the

network and resulting in heavy loss of data. The most common and severe threats that can affect

an organization such as: Wireless Sniffing, DoS (Denial of Service), sniffing of VoIP network,

Trojans and unauthorized access to FTP and Mail server.


Wireless Network Sniffing and potential measures to secure wireless Networks

Within more than 80% of the business organizations, business transaction and process are

taking placing over a wireless network within the organization and on WWW for business

processes globally. The business processes can be transferring of data from one zone to other or

sending mails over Internet using wireless networks and can be accessing of data servers and

FTP servers over internet using wireless networks. By sniffing a single wireless network, an intruder

can access all the incoming and outgoing traffic over that wireless network resulting in heavy loss of

confidential data to an organization. If any intruder able to crack firewall and he will be able to access

wireless network’s internal network and can read all the confidential data and also can inject malicious

packets in the network so as to route the packets to some other destinations. These critical business

processes contains sensitive data that is being transferred has to be secured from such attacks like

wireless sniffing and breaking of firewall system.


Related Questions in computer science category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.