In: Computer Science
There are a variety of security mechanisms available to protect the enterprise network. Discuss how an enterprise might be attacked and the type of security device or mechanism you would select to combat the attack. What would you envision as being the legal, social, and ethical implications of using the security device or mechanism?
Answer: there are various types of security mechanism which is used to secure an enterprise from an attack these mechanism are used to prevent the unauthorised access to an enterprise network it is very essential to use these security mechanism to prevent from cyber attacks the security mechanism is used to implement the security service to protect a network from being attacked by the attackers these security mechanism are designed to detect, prevent, or recover from an attack. The mechanisms also implement protocol layer tcp or application-layer protocol to prevent the attacks.
there are various types of attacks by which an enterprise might be attacked with :
1: Malware attack
malware is an attack which is done by malicious programs like worms, computer viruses, Trojan horses, and spyware that hijack and delete the sensitive data.
2: ransomeware attacks:
ransomeware has been from a long period into cyber crime industry. in this attack the victim get blocked from access the data and attacker get the sensitive data of the victim.
3 Phishing attack
phishing attack is an attack where the attacker .trick the user
by convincing user to download an infected file or by clicking an
malicious link,sms or email.
4. MITM attack
man in the middle attack is a attack which can be done by intercepting in a communications between two hosts. the attacker can plant a requests that seem to be originated from an original source.
As we now know about different types of attacks now there are various security mechanism to prevent the attack and secure the network from attack. i would select these security mechanism to combat the attacks:
1: encipherment:
decipherment is used to make data unreadable to unauthorized entities it deals with the hiding of data.it is the process of transformation of plaintext to ciphertext
2: notarization
notarization is the use of trusted third party for the security to control the communication between the two entities. It is a mediator between sender and receiver to prevent the communication interrupted by any unauthorised entity
3: authentication:
this security mechanism is used to identify unauthorized person to get access the networks.
4: Message digests
message digests is a security mechanism which is used to ensure the integrity of a message transmitted over an unsecure channel. messages are passed using a Cryptographic hash function. and it creates a compressed image of the message as known as digest.
5: firewall
firewall is used to prevent unauthorised access.it s used to monitor all incoming and outgoing communications and prevent the unauthorized access and malicious activity.
being the legal,social, and ethical implications of using device or mechanism it is very essential to use these security mechanism to prevent from cyber attacks the security mechanism is used to carry out the security service to protect a network from being attacked by the attackers these security mechanism are designed to detect, prevent, or recover from an attack. The mechanisms also implement protocol layer tcp or application-layer protocol to prevent the attacks. these mechanism are legal and can be done ethically without breaking any protocols.