Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Task As a team or individually, you will secure a network against the attacks li

ID: 3750471 • Letter: T

Question

Task As a team or individually, you will secure a network against the attacks listed in the table below. The provided security measures can be implemented as listed but are not the only measures that can be used. To receive full credit your security measure(s) should block the attack and/or vulnerability without exposing the network another way. Explain how the security measurement(s) overcomes the attack/vulnerability. Your explanation should also include how the chosen attack or vulnerability can be accomplished and the devices within the system architecture (LAN only) potentially compromised. As you work through the activity, keep in mind the purpose of the attack/vulnerability and what must be in place for the attack/vulnerability to be successful Submit your answers as an attached file (Word, PDF, RTF, TXT are acceptable). Use your textbook, notes and any other outside resource to complete the activity by the due date. Be sure to cite your sources Vulnerabilities & Attacks DDoS Privilege Escalation Trojan Horse Phishing Brute Force Attack SQL Injection Security Measures Protocol Analyzer Disabling Unused Ports 802.1X MAC Filtering Baseline DMZ Firewall IDS/IPS User Access Controls Antimalware Antivirus VLANS

Explanation / Answer

DDoS
-> It stands for Distributed Denial of Service. It is the attack wherein a high amount of traffic is being created for the websites causing a server crash, unavailability, end users interrupt. The main reasons for this vulnerability are not tracking the addresses wherein the requests are coming, not monitoring the protocol analyzer. I would suggest using DMZ (Demilitarized Network) which prevent unauthorized access from an untrusted network and use protocol analyzer to consistently monitor and report the suspicious activities. Use network baselining to monitor the performance of a network.
https://techspective.net/2017/05/11/20-ways-prevent-deadly-ddos-attack/

2. Privilege Escalation is one of the main issues wherein the internal users escalating the privileges granted to them and misusing the network. This can be prevented using Firewall. Since it is known that it is LAN based architecture and firewall prevent unauthorized access outside the world. User access controls also need to be taken care wherein each user will be given a set of access control and it is audited.
https://searchsecurity.techtarget.com/definition/privilege-escalation-attack

3. Trojan Horse
These are malware which is hidden and when these hidden programs executed causes a serious threat to your computer data as well as security. In order to prevent that AntiVirus and AntiMalwares can be used. It would help to block the websites which are unsecured, suspicious and the domain which is already available from virus and malware databases maintained by the antivirus and malware companies to protect their users against threats.
https://www.accuwebhosting.com/discussion/forum/peer-support/how-to-s/windows-server/1242-how-to-prevent-trojan-horse-infection

4.Phishing
As the name itself suggests, phishing is making a user believe the user is accessing the correct website but the website is phished website which looks like an authentic website.
In this antivirus and malware can be used to block websites. Most of the phished websites are HTTP and unsecured network. DMZ can be used to analyze an unsecured internet network where the request is coming from.

5. Brute Force attack
It is a trial and error method to get access to the system. For example, it is known that username is 4 digits number. Then all the permutations and combinations are tried to get access. To prevent this 802.1x IEEE protocol can be implemented and a protocol analyzer can be used to find abnormal patterns, IDS and IPS can be used for intrusion detection and monitoring. Baselining can be used to monitor network usage from the same network. Best way to prevent is MAC filtering. Each device has its MAC, if too many requests are coming from the same device then it is suspicious.
https://www.juniper.net/us/en/products-services/what-is/ids-ips/

6. SQL Injection
It is a technique where the database is being injected from the front end.
To prevent that we proper validations need to be done from the frontend so that it does not allow malicious code to be injected into the database from the front end components.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote