Monday, June 24, 2019

Week 2 CYB632 Assignment Example | Topics and Well Written Essays - 500 words

Week 2 CYB632 - Assignment ExampleIn this case, the aggressor sends a packet to a multitude with a forged IP address. The host consequently sends an acknowledgement waiting for the response. However, this response is never given and hence the unanswered queries accumulate in the buffer of the device being targeted. When many spoofed queries argon sent, these results in the overflow of the buffer and the engagement device may crash (Liska, 2003). Secondly, IP spoofing can also be used in man in the middle attacks. In this case, the attacker is able to intercept the traffic that is heading between two given devices on a network. This helps the attacker monitor network traffic and may gain access to sensitive information such as passwords and usernames. Unfortunately, it is usu solelyy difficult for users to know the traffic is being intercepted by the attacker since each packet is eventually forwarded to the desired destination. The best countermeasure that can be used to address IP spoofing is ingress filtering performed by routers. In this case, the routers check that all the incoming packets are from legitimate sources or machines. If the router determines that the IP address on the packet is not in the address block the interface is connected to, then the packets are dropped.A penetration testing give notice (of) gives the results of a vulnerability assessment and the penetration test of a given system in an makeup (Lee, 2009). This report also offers recommendations on how the risks identified can be mitigated. A penetration test report is important to any organization or business. First, this report helps the organization enhance the security of its systems. In the modern world, the damage that can be caused by hackers can be extensive, and this may significantly affect the operations and survival of the organization (Lee, 2009). Therefore, the pentest report helps identify vulnerable areas within systems and provides guidelines for addressing them. Th is helps the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.