Missing data encryption during the communication in LAN network
and data sharing also OS command injection &
SQL injection are also possible if data is not encrypted by any of
the algorithm.
Buffer overflow is also a big headache in any of the application as its obvious attack that each one has some own limit and beyond that anything can break down.
Missing authentication for critical function like weak username password during user authentication or not properly applied properly or some backdoor even entering right credentials.
Unrestricted upload of dangerous file types like some php file uploading function which can allowed any file could be do more damage.
Cross-site scripting and forgery is web vulnerability that can be applied over http protocol and cookie and session attack is possible on LAN sites.
Download of codes without integrity checks like no antivirus software is installed and no security patches applied.
Use of broken algorithms like some outdated algorigthms which are not updated with latest fixes.
below are also the vulnerabilities
URL redirection to untrusted sites
Path traversal
Bugs
Weak passwords
Software that is already infected with virus
if you have any doubt then please ask me without any hesitation
in the comment section below , if you like my answer then please
thumbs up for the answer , before giving thumbs down please discuss
the question it may possible that we may understand the question
different way and we can edit and change the answers if you argue,
thanks :)
using the tcp/ip model, explain common network vulnerabilities that exist and common network serivices and applications
Use the Internet to research and explore vulnerabilities that are related to TCP/IP (transmission control protocol/Internet protocol). In a 3–5-paragraph posting, provide the following information: Current vulnerabilities related to TCP/IP Countermeasures that address the vulnerabilities Recommended products for addressing TCP/IP vulnerabilities If you have experience with TCP/IP, include your own experience and recommendations in this posting.
Explain the purpose of QoS on a TCP/IP network. Define the basic purpose of IP precedence, TOS, Diffserv, and ECN functionality
Please answer following short parts for Upvote (please answer all) a) Which layer of the TCP/IP model implements the Network Address Translation protocol? b) What are the advantages and disadvantages of Network Address Translation? c) How is SNAT different than NAT? d) Explain the reasons why or why not the Network Translation Protocol may increase network security? e) What is the difference between a TCP port and an IP Network address? f) List the advantages and Disadvantages of TCP Transport...
166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...
Which of the following are true when comparing TCP/IP to the OSI Reference Model? (Choose two.) A. The TCP/IP model has seven layers, while the OSI model has only four layers. B. The TCP/IP model has four layers, while the OSI model has seven layers. C. The TCP/IP Application layer maps to the Application, Session, and Presentation layers of the OSI Reference Model. D. The TCP/IP Application layer is virtually identical to the OSI Application layer.
The most common protocol in use is TCP/IP, which is a group of protocols that functions together to permit __________ communication. telephone email LAN web-based __________ is a type of network software that allows administrators to define the location of data storage in a network and determine user access to that data. Wired software User management software Application software File management software Which of the following describes extranet? A private LAN only accessible to those with permissions A LAN that...
Describe how to use applications and communication protocols in the Transmission Control Protocol/ Internet Protocol (TCP/ IP) suite to design IP addressing and subnetting solutions for variable length subnet masks in your small home network.
List the layers of the OSI model under the basic communications model. Include the main TCP/IP protocols for key layers. In additional list the various common devices and on which layer(s) they live (example: switches, hubs, routers, gateway, etc.)
The TCP/IP model does not map directly with the OSI model on a layer to layer basis True False
Which of the following in connectionless – Ethernet, IP, TCP? Explain why. Which of the following is unreliable – Ethernet, IP, TCP, UDP? Explain why. Why is it a good idea to have reliability at the transport layer? How many layers of the hybrid TCP-IP stack does a typical Router implement? Switch implement? Destination host implement?