Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Essay

Network Security P1,P2,P3,M1,M2,D1 and D2.

Beoordeling
-
Verkocht
1
Pagina's
24
Geüpload op
02-12-2019
Geschreven in
2019/2020

All my work received distinctions overall in this unit. Please feel free to email me for documentation. Feel free to use my work as guide to complete your own P1,P2,P3,M1,M2,D1 and D2. Listed at the lowest possible price to give you a grade that you need. Included 5183 words course work assignments with 24 pages full of details and high quality information. Contact me for more information or leave a comment. Thanks for reviewing.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

NAME: BADAR RASHID HAMDOUN.
SUBJECT: NETWORK SECURITY.
ASSIGNMENT: P1, P2, P3, M1, M2, D1 and
D2.

,INTRODUCTION TO NETWORK SECURITY.

Computer network is a set of linked computers. If you want to use your computer
and keep it safe and secure from threats, you should apply computer security.
Network security is the protection of computer networks from unauthorized
access or loss. Network attacks may be caused by human actions either
mistakenly or malicious intent through incorrect installation configuration or
operation.

TYPES OF NETWORK ATTACKS.

(1) Denial of services. This is the type of network attacks in which perpetrator
seeks to make a machine or network resources inaccessible to an intended
user by temporary disrupting services of the user connected to the
network. The purpose of denial of services is to damage organization
networks cooperation by denied access to the user. Denial of services can
attack any online activity. Example of denial of services attack is when
hackers try to hack business or banks organization, they hack and steal
money or data by slow down network performance services.
(2) Back door attack. The purposes of back door attack are breaking services,
unlocking hidden features and information leakage. Backdoor is a malware
type use ineffective normal authentication procedures to access the
system. For example of backdoor attack is, lets say for example there are
two companies, company of website and company of email server and on
other hand, there are hackers, hackers try to connect to these company
networks and company respond quickly by building firewall( strong
security) which protect hackers to attack the company. Then hackers when
they confirmed that there is strong security at the company, hackers use
end users and vendor to attack the company because there is weak
security.

, (3) Spoofing. This is type of attack in which a person successfully act as another
by falsifying data in order to get access to something. For example, when
the user try to log in to the account, the first log in got attacked by the
hacker who is act as a server, the hacker will know your password and will
get all your information, and if you try again to log you will be connected to
a real server. This how spoofing attack occur.
(4) Brute force. This is a type of attack that use method of trial and error to get
information, such as user password or personal identification number. In
brute force attack, their special software designed for guesses password.
you can protect brute force attack by increasing the length, complexity of
password.
(5) Viruses. This is the type of malicious software that replicates itself and
infect computer without permission of the user. Virus has the ability to
copy itself and attach to another computer. Also virus has the ability
damage computer programs and inserting its own code.
(6) Worms. these are self replicating files that located in the memory of
infected computer. Worms used computer networks to replicate such as
email. Worms does not need human action to replicates. The purpose of
worm in the computer is stealing data, damage system files and giving
backdoor access for attackers.
(7) Trojan. This is a computer program that get access to a computer system by
appearing to be harmless but is designed to damage computer. They may
sit to your computer and collect information with knowing. Trojan horse
can steal some of your information such credit card information and install
more malware in your computer. Your computer can be affected by Trojan
by downloading anything from authorized source.
(8) Spyware. It is software program that secretly gathers personal information
and send without user aware of it, from a computer when it is online. It
records what you do in your computer. Spyware is also used in criminal
investigation area. Spy ware can be penetrate in your device in the form of
Trojan horse. Spy ware is also used to track your email username, password
or personal identification number.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
2 december 2019
Aantal pagina's
24
Geschreven in
2019/2020
Type
ESSAY
Docent(en)
Onbekend
Cijfer
Onbekend

Onderwerpen

$8.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Badaralsalmy Modern college of Business and science
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
71
Lid sinds
6 jaar
Aantal volgers
56
Documenten
75
Laatst verkocht
3 jaar geleden
Complete bundles of BTEC extended diploma in IT or computing

All my assignments which I have uploaded received dinstinction overall since they include everything required as per Pearson qualification policies

3.2

13 beoordelingen

5
4
4
2
3
3
2
0
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen