Tuesday, September 24, 2019

Technical Paper Case Study Example | Topics and Well Written Essays - 2500 words

Technical Paper - Case Study Example Moreover, there are some limitations associated with the SIEM such as number of events per second to be generated, based on the logs being generated from the system and pulled by the SIEM agents Firewall. (2007). Vulnerabilities in network security are regarded as the â€Å"soft spots† that are evidenced in every network. These vulnerabilities exist in the network as well as individual devices that constitute the network. HTTP, FTP, and ICMP are not secure essentially. Simple Mail Transfer Protocol (SMTP), Simple Network Management Protocol (SNMP) and SYN floods are associated with the inherently vulnerable structure upon which TCP has been designed Various types of network equipment such as firewalls (Agnitum outpost persona firewall pro 2.0.2004), switches, routers; all have security weaknesses that must be acknowledged and safeguarded against. Those include the following weaknesses: Network administrators or network engineers are required to understand the configuration weaknesses and accurately configure their computing and network devices to counteract the common configuration weaknesses. This common problem occurs upon turning on JavaScript in web browsers which enables attacks by means of hostile JavaScript whilst accessing untrusted sites. Some complications also take place due to IIS, Apache, FTP and Terminal Services. Significant security problems come about because of misconfigurations of the equipment itself. For instance, misconfigured routing protocols, certain access lists or even some SNMP community strings can open up large security holes. The unauthorized discovery and mapping of systems, services, or vulnerabilities is referred to as Reconnaissance. It is also known as information gathering and it commonly manifests before an actual access or denial-of-service (DoS) attack. Reconnaissance is rather comparable to a thief casing a neighbourhood in search of vulnerable homes to break into, like easy-to-open doors, windows left

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.