Networked System
Security
Assignment 1
Daniel C 10/16/19 [F1046] - BTEC Level 3 in IT
, Contents
Network attacks and mitigation........................................................................................................2
1. Reconnaissance attack...................................................................................................................2
2. Virus...............................................................................................................................................2
3. Worm.............................................................................................................................................2
5. Brute force attacks.........................................................................................................................3
6. DDOS attack with botnets..............................................................................................................3
Software mitigation..........................................................................................................................4
Intrusion detection and protection systems (IDPS)...........................................................................4
Host-based systems...........................................................................................................................4
Commercial IDPS 1 – McAfee NSP.....................................................................................................4
Commercial IDPS 2 – NSFocus NGIPS................................................................................................5
Analysis of recent security breaches.................................................................................................5
Sony pictures hacked.........................................................................................................................5
WannaCry..........................................................................................................................................6
Equifax breach...................................................................................................................................7