Wednesday, August 14, 2019
Week 2 CYB632 Assignment Example | Topics and Well Written Essays - 500 words
Week 2 CYB632 - Assignment Example In this case, the attacker sends a packet to a host with a forged IP address. The host then sends an acknowledgement waiting for the response. However, this response is never given and hence the unanswered queries accumulate in the buffer of the device being targeted. When many spoofed queries are sent, these results in the overflow of the buffer and the network device may crash (Liska, 2003). Secondly, IP spoofing can also be used in man in the middle attacks. In this case, the attacker is able to intercept the traffic that is heading between two given devices on a network. This helps the attacker monitor network traffic and may gain access to sensitive information such as passwords and usernames. Unfortunately, it is usually difficult for users to know the traffic is being intercepted by the attacker since each packet is eventually forwarded to the desired destination. The best countermeasure that can be used to address IP spoofing is ingress filtering performed by routers. In this case, the routers check that all the incoming packets are from legitimate sources or machines. If the router determines that the IP address on the packet is not in the address block the interface is connected to, then the packets are dropped. A penetration testing report gives the results of a vulnerability assessment and the penetration test of a given system in an organization (Lee, 2009). This report also offers recommendations on how the risks identified can be mitigated. A penetration test report is important to any organization or business. First, this report helps the organization enhance the security of its systems. In the modern world, the damage that can be caused by hackers can be extensive, and this may significantly affect the operations and survival of the organization (Lee, 2009). Therefore, the pentest report helps identify vulnerable areas within systems and provides guidelines for addressing them. This helps the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.