Academic Master

Technology

Network Administration Principles

Security Threat Network Administration Principles Mitigating the threat Solutions and technologies
Distributed Denial of Service (DDoS) Flood guards It is important to put measures in place to detect and block these attacks. Using a strong Windows Defender and firewalls could be appropriate to deal with this kind of attack (Kizza, 2017). Cisco IOS is a technology that can be used to address flood attacks. It provides a command to disable or enable the defender.
Phishing Secure router configuration Phishing is an attempted attack aimed at obtaining sensitive information. These attacks are usually directed to unsecured networks. Securing the network through appropriate configuration is appropriate to mitigate the threat (Bryant & Rodrick, 2018). Data should be encrypted passwords, particularly for routers. IP addresses from trusted networks should be configured before data exchange. Unique and secret passwords are the ultimate solution to this kind of attack.
Viruses Unified threat management Viruses exist in different forms and are easily transferrable in unsecured networks. Reliable antivirus software can mitigate the threat. Restricting access to ports can help avert the danger posed by the threat. Limiting access to networks with passwords can prevent virus attacks. Updating Windows Defender and an antivirus package can provide a solution to virus attacks (Kizza, 2017).
Spoofing Network Separation Spoofing occurs when attacks recreate IP packets that create a false address to secure entry. Special programs are used in spoofing, and firewalls are appropriate to mitigate the threat. Separating networks makes this attack hard to complete (Kizza, 2017). Network separation is key to dealing with spoofing attacks. The separation creates units that prevent entry from an unauthorized source. Combining the technique, using firewalls, and antivirus blocks possible attack attempts by intruders (Bryant & Rodrick, 2018).
Sniffing Port security and implicit denial. Devices and applications initiate such attacks. Blocking ports that access a system allows such attacks to be prevented. Individuals seeking to fix gadgets find it hard to execute the attack. Implicit denial using firewalls and antivirus software can help prevent unauthorized applications from entering the network. Some of these applications are sent as malware whose access should be rejected promptly (Kizza, 2017). Sniffing can be stopped through network configuration that denies access to unauthorized applications and uses. Focusing on port security prevents the network from reading gadgets inserted into network hardware (Bryant & Rodrick, 2018).
Application-Layer Attack Access Control List The attack creates faults in applications. It then results in the attack gaining entry into the servers and networks where data can be manipulated. Controlling access to the network is crucial in mitigating the threat. Networks should be designed to shut down in the event that applications cease working (Bryant & Rodrick, 2018). The attack can be solved with some strategies. Updating antivirus and firewalls is critical in denying access to such attacks. Creating loops in the networking helps to make the attempted attacks unsuccessful (Kizza, 2017).
Man-in-the-Middle Attack Unified Threat Management A combination of techniques can be used to mitigate against this attack. Data encryption is crucial in creating security for information shared with different parties. Network configurations through loops and denial of access will make it hard for a third party to monitor and hijack communication in a network. Firewalls and antivirus can help combat the attack (Bryant & Rodrick, 2018). Combining several security measures is crucial in solving this attack. Getting advanced devices in a network with improved security features can address the attack. Regular scanning and updating of antivirus and firewalls are important for network security (Kizza, 2017).

References

Bryant, W. & Rodrick, M. (2018). Network Administration Principles. Retrieved from https://itpro.tv/course-library/security/network-administration-principles/

Kizza, J. M. (2017). Guide to computer network security. Springer.

SEARCH

Top-right-side-AD-min
WHY US?

Calculate Your Order




Standard price

$310

SAVE ON YOUR FIRST ORDER!

$263.5

YOU MAY ALSO LIKE

Pop-up Message