Network Security System

Read Complete Research Material

NETWORK SECURITY SYSTEM

Twitter: Network Security System



Twitter: Network Security System

Describe and justify the various malicious attack scenarios that can cause each type of threat (disclosure ? integrity ? or denial of service) to occur individually in Twitter.

Malicious attack scenarios that can cause each type of threat are disclosure ? integrity ? and denial of service. Each threat and threat category highlight the potential for the loss of significant tangible and intangible business value. (Garvey 2003)

Disclosure

Threats of disclosure include eavesdropping. Eavesdropping involves listening to conversations that would otherwise be private. In the data world eavesdropping involves sniffing network packets for data that can be interpreted in real-time or saved for later analysis or playback. In the converged space ? the new eaves- dropping threat involves sniffing voice conversations.

Integrity

Integrity threats are threats based on the insertion of bogus content into files or communication streams. Attackers may insert malicious or misleading data into unprotected files. When read or executed with the assumption that the files have integrity ? the corrupt files may disrupt system operation. Attackers may also change the contents of data as they are transferred resulting in the improper interpretation of the data. Another integrity threat involves an attacker spoofing the identity of a valid user. When successful ? the imposter may gain access to proprietary information or systems and operate with the full privileges of the impersonated user.

Denial of Service

Denial of Service (DoS) attacks typically flood the network ? or a device ? with traffic in an attempt to render a device ? or the entire network ? to be unusable by authorized users. Distributed Denial of Service attacks (DDoS) occur when an attacker gains control of multiple computers and directs them to simultaneously attack a single target. This type of DoS attack is more difficult to thwart because the perpetrators are more numerous. DoS attacks take many forms that include ICMP Floods ? TCP SYN Floods ? and UDP Floods. (Ilgun 2004)

Describe and justify the various malicious attack scenarios that can cause each type of threat (disclosure ? integrity ? and denial of service) to occur at once in Twitter.

When referring to computer science the purest mean of the phrase 'Denial of Service' was as it sounds ? denying service or access to those were not authorized. Today Denial of Service takes on a whole new meaning instead of keeping computer secure it's a tool used to cause destruction. DoS (Denial of Service) is an attack in which an internet resource ? network ? or computer is rendered useless. This attack is accomplished by sending an unmanageable amount of data that causes systems to overload and sometimes crash. The targeted system could be anything from a singular computer (although not a very useful attack) ? to IRC servers ? email services ? or websites. The form or method of the attack can vary as a DoS attack is not particular ? but the result is always the same. The victim is slowed down ? some might say artificially ? ...
Related Ads