Question

Question The followings are the most common security threats in networks. a. TCP/IP Hijacking [5 marks]...

Question

The followings are the most common security threats in networks.
a. TCP/IP Hijacking [5 marks]
b. Network Sniffer [5 marks]
c. Password Hackers [5 marks]
d. Server Hijacking [5 marks]
e. DoS Attack [5 marks]


You are expected to carry out an analysis and discuss on the nature of each threats by
addressing the following element like;
i. What it is all about?
ii. How can such attack/threats take place in the network?
iii. Why they do it?
iv. When normally such attack take place (i.e. any specific time of the year,time of the day)
v. Where is such attack targeted?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a) TCS/IP Hijacking: This kind of hijacking happens when an authorized user grabs access to another user network. This kind of attacks takes place using the approach of man-in-the-middle which a type of network sniffing. THey do it grab access to the network and to ruin the data. There is no specific time to perform that attack usually this attack can take place any time, any day, any year. This attack targets the network connection of another user.

b) Network Sniffer: Network sniffer is also one kind of attack where the intruders gain access to the network and eavesdrop all the transaction. This can also happen at any time and the target of this attack is the network.

c) Password Hackers: Password hackers hack the password data and collect sensitive information of the users. These attacks occur in the networks. They perform this to obtain secret information from the users. This can also occur at any time.

d) Server Hijacking: Server hijacking is a major form of attacks where the server has been hacked and all the server data is compromised. These attacks can place at any time. In this attack, the server has been targeted.  

e) DoS Attack: Denial of service attack is all about restricting a particular service to a user. These attacks are in the network. They do it to hijack the system by giving its services. This attack also occurs at any time. The targeted one is a server and the network.

Add a comment
Know the answer?
Add Answer to:
Question The followings are the most common security threats in networks. a. TCP/IP Hijacking [5 marks]...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • i have the case study question with the answers but i need help to re-write the...

    i have the case study question with the answers but i need help to re-write the answers. please see the attached files Case Study Analysis (CSF3003) Assessment Description and Requirements CLO1: Case Study 1 Ahmad lef home to study master and PhD in Australia. He has fees for the first semester only. After he arrived to Sydney and settled down, he start looking for a part-time job to save money for the next term. Ahmad has some experience on making...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT