StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Examination of the Technologies Currently Employed for the Detection of a Worm Attack and Its Subsequent Negation - Term Paper Example

Cite this document
Summary
The aim of the research is an examination of the technologies employed for the detection of a worm attack and its subsequent negation. The research illustrates that by taking existing honeypot technologies, a Honeywell could use the honeypots as sensors to detect and respond to unauthorized traffic. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Examination of the Technologies Currently Employed for the Detection of a Worm Attack and Its Subsequent Negation
Read Text Preview

Extract of sample "Examination of the Technologies Currently Employed for the Detection of a Worm Attack and Its Subsequent Negation"

Download file to see previous pages

Lyle (1997) posits that most attacks fall within one of three main categories: attacks on integrity, attacks on confidentiality or attacks on availability. The act of maintaining the integrity of a network is the act of preventing authorized users of the system from making changes beyond their authority, and to prevent unauthorized persons from making changes at all. If the integrity of a system cannot be maintained, then the attacks on confidentiality and availability are much more likely to succeed.

Any data stored within a system whose access has been restricted to a set of users can be thought of as confidential. Within a computer network, multiple individuals are performing roles where data access should remain restricted (Lyle, 1997). For example, an R&D department is assumed to be continually engaged in the research, development, and testing of new products.  Given that the research and development may involve millions of dollars in expenditure and many millions more in potential profit, it can be safely assumed that the corporation in question would want no unauthorized personnel to access the research data (stored on the department’s computers) under any circumstances.

The motivation for attacks is as varied and numerous as the potential attackers in the world. The desired result of an attacker is to compromise security. To accomplish their desires, the attacker must exploit weaknesses within the system they wish to compromise. On a given system any service, protocol or connected system can be viewed as a potential entry point for the attacker. The analogy of a chain is often used when describing the security of a system, in that the weakest member of the system will undoubtedly be the first to fail when tested.

 At the start of an attack, all the potential attacker may have to go on is the IP address of the machine they want to compromise. While it is conceivable that they could run toolkits that try hundreds or thousands of known vulnerabilities against this IP address, the more than casual attacker will attempt to gather information about their target before launching an attack.    

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Examination of the Technologies Currently Employed for the Detection Term Paper, n.d.)
Examination of the Technologies Currently Employed for the Detection Term Paper. Retrieved from https://studentshare.org/information-technology/1506041-network-security-phd-essay
(Examination of the Technologies Currently Employed for the Detection Term Paper)
Examination of the Technologies Currently Employed for the Detection Term Paper. https://studentshare.org/information-technology/1506041-network-security-phd-essay.
“Examination of the Technologies Currently Employed for the Detection Term Paper”, n.d. https://studentshare.org/information-technology/1506041-network-security-phd-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Examination of the Technologies Currently Employed for the Detection of a Worm Attack and Its Subsequent Negation

What Is Electronic Authentication

Electronic authentication (E-authentication) presents an immense challenge in several scenarios, as the subsequent sections of this research will highlight.... Our existence in society has become dependent on proving our credentials, our identity and our right of access to a certain set of resources....
12 Pages (3000 words) Essay

Emergency planning and Business Continuity Management

The paper “Emergency planning and Business Continuity Management” looks at the business environment, which has become complex.... Various internal and external factors contribute to this complexity.... Organizations have no choice but to determine and manage the risks.... hellip; The author states that a business continuity management system is a wide fit-for-purpose standard....
19 Pages (4750 words) Research Proposal

Effects of economic and political climates on current higher education

Notably, higher education is regarded as a significant service granted by the state to enable its citizens to get the opportunities of advancing their socio-economic standards.... In addition, of equal importance, they must put into consideration the pressures that are being exerted by the external forces on the institution of higher learning before its survival is put in jeopardy....
17 Pages (4250 words) Essay

Internship Responsibilities: The Future of the Internet Economy

The company operates its divisions within Canada as well as Mexico amongst the other several subsidiaries within its brand (Sullivan).... The company operates its divisions within Canada as well as Mexico amongst the other several subsidiaries within its brand (Sullivan).... The corporation is prominent for its success as a leading integrated retailer that mostly focus on the seeming connections of the digital as well as physical shopping experiences to their consumers....
15 Pages (3750 words) Essay

Security, Risk, and Compliance

nbsp; Their data can be compromised by any attack, and this can open up the organization to serious liability.... nbsp; There are many threats that come from sources, both inside the organization and outside the organization that makes a network vulnerable to attack....
8 Pages (2000 words) Research Paper

Organisation Behaviour in FedEx

Among the many approaches employed by managers from different organisations, metaphors could be used to vividly explain the structures of such organisations in a way that managers would find it easy to understand the organisation and come up with solutions to its define problems.... With its headquarters in Memphis, Tennessee, the American based logistical services firm founded by Fredrick W.... The objective of its formation was to provide a remedy to the then inefficient distribution system in air freight (FedEx 2012)....
14 Pages (3500 words) Research Paper

Intelligence and the Increasing Advancement in the Technology

It has been argued that the advancements in the technologies which have provided numerous opportunities to the world are misused by certain groups such as terrorists and aspirant countries.... Another major threat that is being faced by the world is the terror of the nuclear attack.... currently, cybercrimes are targeting businesses and government information technology (IT) infrastructure for various purposes.... This paper "Intelligence and the Increasing Advancement in the Technology" focuses on the fact that the world has been witnessing continuous technological advancements due to which many technologies are getting quickly obsolete....
9 Pages (2250 words) Case Study

Survey in Multimedia Data Mining by Content in Social Media

subsequent to this line, data mining has remained to be one of the most promising areas.... Simultaneously, social media is absolutely not an enchantment medication, in particular bearing in mind that it is not free of its personal considerable challenges and limits.... Essentially, the accessibility of content does not need broad-spectrum classification as well as detection undertakings (Teredesai et al.... Arguably, this extra metadata can be utilized to develop and increase multimedia along with content examination methods....
9 Pages (2250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us