StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Concept of a Browser Security - Assignment Example

Cite this document
Summary
The paper "The Concept of a Browser Security" suggests that the Botnets are majorly an application for the Distributed Denial-of-Services attacks. These are attacks that target the computer system, alternatively, a network system that results in loss of service by the users…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
The Concept of a Browser Security
Read Text Preview

Extract of sample "The Concept of a Browser Security"

? Security Science Question In most cases, the Botnets are majorly in application for the Distributed Denial-of-Services attacks. These are attacks that target the computer system, alternatively, a network system that result in loss of service by the users. The loss of service is through the lack of connectivity or termination of the network system via the consumption of bandwidth within the network in that the system gets overloaded. The Botnet application can be useful through numerous ways apart from the usual security purposes that it serves. With considerations on the encryptions and capability of the single web-based C&C server, the application could be effective to track the bots that are present in a Java PHP. The same server requires a design in that it is able to receive reports that come from the bots and ensure the provision of instructions to the bots such as sleep, spam, and scan. The bot application requires a designed that enables it to work effectively under Java with the capabilities to facilitate deployment on the Linux hosts and report to its respective C&C. An additional capability of the botnet application under Java is to sniff traffic that has significance to any internet hacker. Question 2 The Rootkit is in a design that conceals the presence of certain procedures from normal detection processes that permits the consistency within fortunate access to a computer. By the time one discovers the Rootkit attack, it is appropriate that he or she distinguishes the degree of the attack before clean up. One has to presume the cumulative network transactions all hosts in the network within the compromise timeframe. The best approach is to conduct a recovery and prevent any possible attacks in future. Question 3 The Man-in-the Middle is an attack that cuts off the communication present within two dissimilar systems. Through the application of diversified techniques, the attacker has the capability to separate the original TCP into two secondary connections. One of the connections is present between clients with the attacker, while the alternative connection exists with the server. The moment a TCP connection experiences any interruptions, the attacker is able to take the proxy position with the ability to read, insert, plus, modify information via the cut off communication. Question 4 A browser security is an application designed for web browsers to use in internet security for safeguarding of networked data. There are beaches of malware that have the ability to interrupt with the computer system as an individual browses the internet. Hackers with intentions to exploit the security for a browser often use JavaScript. The Browser security is responsible for preventions on security exploits that are majorly after advantage of a user’s vulnerability that is achievable through almost all browsers. Question 5 DLP stands for Data Loss Prevention that is useful in the assistance of an organization to develop a plan towards the transfer in both virtual and cloud environment. The Data Loss Prevention is effective in the provision of control with visibility in an organization’s infrastructure. The Data Loss Prevention offers an organization the ability to enforce information control. This is evident through runtimes where the DLP implements are obligatory to enterprises and cloud suppliers alike to secure sensitive information within the virtual and cloud surrounding. Other necessary applications of the DLP include monitoring and verification of data within a computer network. Question 6 I would consider the implementation of Snort given the fact that it is an open source network responsible for the security against intrusion detection systems. Most organizations are always at risk of intrusion with knowledge of employees accessing several websites that could provide access by hackers. Snort is essential since it comprises the reimbursement of signature, protocol, with anomaly-based inspections. Question 7 The SYN flood attack sends the TCP link requests quicker as compared to the speed in which a machine can process the attack. With the SYN flood attack, the attacker develops an arbitrary source address for every packet. The best approach to the secure oneself from the SYN flood attack is through Micro blocks, SYN cookies where a SYN-ACK is sent through a cautiously developed seqno produced as a hash for client IP address, port figure along with other significant details. Other defensive techniques applied to the SYN flood attack include the RST cookies, and stack tweaking. Question 8 WiMax and LTE are technologies used in engineering for the provision of high-speed internet services for mobile broadband. They are used in enabling worldwide wireless data connectivity for computing devices, laptops and cell phones. There is a debate in opinion regarding the two technologies, but it is limited to the technological specifications, which are not the same. However, the two have the same kind of benefit to the end-user. The reason for the involvement of the two technologies for mobile broadband is for enabling wireless data connectivity for devices that are WiFi enabled. Question 9 It is possible to visualize around using access control a secure infrastructure through making clear distinctions between authorization domains in the technological infrastructure. The experts in this field can be able to clear distinctions between each facet by identifying attributing and authenticating the boundaries to the management and administration of the organization. Question 10 The most important advantage of using biometrics is that it is difficult to disguise. When using this technology for security purposes, the technology personalizes security, which minimizes the possibility of being compromised. Consequently, it eliminates some problems related to passwords. The use of passwords is a security measure that individuals might employ especially when securing their property or data. There is a possibility that they might forget the passwords, but through biometrics, the possibility of forgetting the passwords is eliminated. The major disadvantage of biometric analysis is that it is very expensive, which limits its use to a few individuals. On the other hand, there is a possibility of an occasional rejection or acceptance of an intruder. Alternatively, when an individual uses this technology to secure his or her valuables, they might be attacked and the attackers might cut off part of their body to access their valuables. Question 11 Among the benefits of hashing passwords is that it restricts access to a hefty collection of passwords and usernames that aremade available online through the numerous online services available. There is a tendency by many people to use the same password in many of the online services and websites, which makes it easy for thieves to have access to numerous bank information and other kinds of data belonging to many people. When a user hashes his or her password, the actual password is stored as a plain text in the database, but every time the individual logs into the account, the the hash that is identical to the plain text runs on the password before performing a search. Question 12 A digital certificate is an electronic pair of files that an individual can use in his or her computer for the creation of a digital signature comparable to a hand-written signature. Some of the files contained in the digital certificate include an individual’s name, email address, a public key, a serial number, a digital signature and an expiration date. Somebody can be able to sign documents electronically using digital certificates, as well as send an email using the certificate to avoid spoofing from other people. Question 13 A hot site is a disaster recovery service that commercial enterprises use for their data processing operations in case of an equipment or computer disaster. For instance, if the data center of an enterprise becomes terminal the institution can move all their data processing operations to a hot site, which has all the instruments that enables it to continue with its operations. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security sciences Assignment Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1484074-security-sciences
(Security Sciences Assignment Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1484074-security-sciences.
“Security Sciences Assignment Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1484074-security-sciences.
  • Cited: 0 times
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us