Wednesday, June 12, 2019
Technical Paper Case Study Example | Topics and Well Written Essays - 2500 words
Technical Paper - Case Study ExampleMoreover, there be some limitations associated with the SIEM such as fare of events per second to be generated, based on the logs being generated from the system and pulled by the SIEM agents Firewall. (2007).Vulnerabilities in communicate certification are regarded as the soft spots that are evidenced in every network. These vulnerabilities exist in the network as well as individual devices that constitute the network.HTTP, FTP, and ICMP are not secure essentially. simplistic Mail Transfer Protocol (SMTP), Simple Network Management Protocol (SNMP) and SYN floods are associated with the inherently vulnerable structure upon which TCP has been designedVarious types of network equipment such as firewalls (Agnitum outpost persona firewall pro 2.0.2004), switches, routers all have security weaknesses that must be acknowledged and safeguarded against. Those include the following weaknessesNetwork administrators or network engineers are required to u nderstand the configuration weaknesses and accurately configure their computing and network devices to counteract the common configuration weaknesses.This common problem occurs upon turn of events on JavaScript in web browsers which enables attacks by means of hostile JavaScript whilst accessing untrusted sites. Some complications also take place due to IIS, Apache, FTP and Terminal Services.Significant security problems come about because of misconfigurations of the equipment itself. For instance, misconfigured routing protocols, certain access lists or even some SNMP community strings can open up large security holes.The self-appointed discovery and mapping of systems, services, or vulnerabilities is referred to as reconnaissance. It is also known as information gathering and it commonly manifests before an actual access or denial-of-service (DoS) attack. Reconnaissance is rather comparable to a thief casing a neighbourhood in search of vulnerable homes to break into, like easy- to-open doors, windows left
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.