Academic Master

Technology

Network Administration Principles

Security Threat Network Administration Principles Mitigating the threat Solutions and technologies
Distributed Denial of Service (DDoS) Flood guards It is important to put measures in place to detect and block these attacks. Using a strong windows defender and firewalls could be appropriate to deal with this kind of an attack (Kizza, 2017). Cisco IOS is a technology that can be used to address flood attacks. The technology provides a command used to disable or enable the defender.
Phishing Secure router configuration Phishing is an attempted attack aimed at obtaining sensitive information. These attacks are usually directed to unsecured networks. Securing the network through appropriate configuration is appropriate to mitigate the threat (Bryant & Rodrick, 2018). Data should be encrypted passwords, particularly to routers. IP addresses from trusted networks should be configured before data exchange. Unique and secret passwords are the ultimate solution to this kind of attack.
Viruses Unified threat management Viruses exist in different forms easily transferrable in unsecured networks. The threat can be mitigated through reliable antivirus software. Restricting access to ports can help to avert the danger posed by the threat. Limiting access to networks with passwords can prevent virus attack. Updating windows defender, as well as antivirus package, can provide a solution to virus attacks (Kizza, 2017).
Spoofing Network Separation Spoofing occurs where attacks recreate IP packets that create a false address to secure entry. Special programs are used in spoofing, and the use of firewalls is appropriate to mitigate the threat. Separating networks makes it hard for this attack to be completed (Kizza, 2017). Network separation is key to dealing with spoofing attacks. The separation creates units that prevent entry from an unauthorized source. Combining the technique, using firewalls, and antivirus blocks possible attack attempts by intruders (Bryant & Rodrick, 2018).
Sniffing Port security and implicit deny. Devices and applications initiate such attacks. Blocking ports that access a system allows such attacks to be prevented. Individuals seeking to fix gadgets find it hard to execute the attack. Implicit denial by using firewalls and antivirus can help to deny unauthorized applications into the network. Some of these applications are sent as malware whose access should be rejected promptly (Kizza, 2017). Sniffing can be stopped through network configuration that denies access to unauthorized applications and uses. Focusing on port security prevents the network from reading gadgets inserted into network hardware (Bryant & Rodrick, 2018).
Application-Layer Attack Access Control List The attack creates faults to applications. It then results in the attack gaining entry into the servers and networks where data can be manipulated. Controlling access to the network is crucial in mitigating the threat. Networks should be designed to shut in the event when applications cease from working (Bryant & Rodrick, 2018). The attack can be solved with some strategies. Updating antivirus and firewalls is critical in denying access to such attacks. Creating loops in the networking helps to make the attempted attacks unsuccessful (Kizza, 2017).
Man-in-the-Middle Attack Unified Threat Management A combination of techniques can be used to mitigate against this attack. Data encryption is crucial in creating security to information being shared with different parties. The configuration of networks through loops and denial of access will make it hard for the third party to monitor and hijack communication in a network. Firewalls and antivirus can help to combat the attack (Bryant & Rodrick, 2018). Combining several security measures is crucial in solving this attack. Getting advanced devices in a network with improved security features can address the attack. Regular scanning and updating of antivirus and firewall are important for network security (Kizza, 2017).

References

Bryant, W. & Rodrick, M. (2018). Network Administration Principles. Retrieved from https://itpro.tv/course-library/security/network-administration-principles/

Kizza, J. M. (2017). Guide to computer network security. Springer.

SEARCH

Top-right-side-AD-min
WHY US?

Calculate Your Order




Standard price

$310

SAVE ON YOUR FIRST ORDER!

$263.5

YOU MAY ALSO LIKE