Network security threats, computer science assignment help

User Generated

nyrk3191

Computer Science

Description

Over the past several years, the chief executive officer (CEO) of your company has read articles on Internet control message protocol (ICMP) attacks and the use of packet sniffers to aid in hacking into computer networks. Though the CEO understands that this is a serious concern, he does not know what, if anything, is being done to protect the organization's network against such attacks.

  • Prepare a 4-page memo in Word outlining what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against other security concerns including worms, viruses, DoS attacks, spyware, and other such network intrusions that can disrupt the day-to-day business activities.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here you go. In case of any further inputs, please let me know.All the best!I appreciate working with you!

Running head: NETWORK SECURITY THREATS

Network Security Threats
Name
Course
Tutor
Date

1

NETWORK SECURITY THREATS

2

Network Security Threats
Internet Control Message Protocol (ICMP) is a network protocol in the Internet protocol
suite. Network devices such as routers to send messages and any other necessary operational
information mostly use it. ICMP is different from TCP and UDP in that it does not communicate
directly between devices. Security issue must be taken into consideration in these network systems.
This memo will analyses how to tackle the security mechanisms in the system.
In a protected computer network, the true blue clients of that framework are yet ready to
do what they ought to have the capacity to do. While one may have the ability to secure a PC past
abuse utilizing extraordinary measures (secured a vault with no methods for power or
correspondence for instance), this would not be viewed as a valuable stable framework due to the
above prerequisite, (Stallings, 2007). It is imperative to recognize the procedures utilized to build
a framework's security from the issue of that structure's security status. Specifically, structures,
which contain major defects in their security plans, cannot be made secure without bargaining their
utility. Thus, most PC frameworks cannot be made safe even after the use of broad "PC security"
measures.
Securing a company network consists of identifying all devices and connections of on a
network, setting up boundaries between the enterprise and the other systems and enforcement of
controls to ensure control access, misus...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags