Network security threats, computer science assignment help

Anonymous

Question Description

Over the past several years, the chief executive officer (CEO) of your company has read articles on Internet control message protocol (ICMP) attacks and the use of packet sniffers to aid in hacking into computer networks. Though the CEO understands that this is a serious concern, he does not know what, if anything, is being done to protect the organization's network against such attacks.

  • Prepare a 4-page memo in Word outlining what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against other security concerns including worms, viruses, DoS attacks, spyware, and other such network intrusions that can disrupt the day-to-day business activities.

Tutor Answer

CASIMIR
School: UC Berkeley

Here you go. In case of any further inputs, please let me know.All the best!I appreciate working with you!

Running head: NETWORK SECURITY THREATS

Network Security Threats
Name
Course
Tutor
Date

1

NETWORK SECURITY THREATS

2

Network Security Threats
Internet Control Message Protocol (ICMP) is a network protocol in the Internet protocol
suite. Network devices such as routers to send messages and any other necessary operational
information mostly use it. ICMP is different from TCP and UDP in that it does not communicate
directly between devices. Security issue must be taken into consideration in these network systems.
This memo will analyses how to tackle the security mechanisms in the system.
In a protected computer network, the true blue clients of that framework are yet ready to
do what they ought to have the capacity to do. While one may have the ability to secure a PC past
abuse utilizing extraordinary measures (secured a vault with no methods for power or
correspondence for instance), this would not be viewed as a valuable stable framework due to the
above prerequisite, (Stallings, 2007). It is imperative to recognize the procedures utilized to build
a framework's security from the issue of that structure's security status. Specifically, structures,
which contain major defects in their security plans, cannot be made secure without bargaining their
utility. Thus, most PC frameworks cannot be made safe even after the use of broad "PC security"
measures.
Securing a company network consists of identifying all devices and connections of on a
network, setting up boundaries between the enterprise and the other systems and enforcement of
controls to ensure control access, misus...

flag Report DMCA
Review

Anonymous
The tutor managed to follow the requirements for my assignment and helped me understand the concepts on it.

Anonymous
The tutor was knowledgeable, will be using the service again.

Anonymous
Awesome quality of the tutor. They were helpful and accommodating given my needs.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors