Question

In: Computer Science

There are a variety of security mechanisms available to protect the enterprise network. Discuss how an...

There are a variety of security mechanisms available to protect the enterprise network. Discuss how an enterprise might be attacked and the type of security device or mechanism you would select to combat the attack. What would you envision as being the legal, social, and ethical implications of using the security device or mechanism?

Solutions

Expert Solution

Answer: there are various types of security mechanism which is used to secure an enterprise from an attack these mechanism are used to prevent the unauthorised access to an enterprise network it is very essential to use these security mechanism to prevent from cyber attacks the security mechanism is used to implement the security service to protect a network from being attacked by the attackers these security mechanism are designed to detect, prevent, or recover from an attack. The mechanisms also implement  protocol layer tcp or application-layer protocol to prevent the attacks.

there are various types of attacks by which an enterprise might be attacked with :

1: Malware attack

malware is an attack which is done by malicious programs like worms, computer viruses, Trojan horses, and spyware that hijack and delete the sensitive data.

2: ransomeware attacks:

ransomeware has been from a long period into cyber crime industry. in this attack the victim get blocked from access the data and attacker get the sensitive data of the victim.

3 Phishing attack

phishing attack is an attack where the attacker .trick the user by convincing user to download an infected file or by clicking an malicious link,sms or email.

4. MITM attack

man in the middle attack is a attack which can be done by intercepting in a communications between two hosts. the attacker can plant a requests that seem to be originated from an original source.

As we now know about different types of attacks now there are various security mechanism to prevent the attack and secure the network from attack. i would select these security mechanism to combat the attacks:

1: encipherment:

decipherment is used to make data unreadable to unauthorized entities it deals with the hiding of data.it is the process of transformation of plaintext to ciphertext

2: notarization

notarization is the use of trusted third party for the security to control the communication between the two entities. It is a mediator between sender and receiver to prevent the communication interrupted by any unauthorised entity

3: authentication:

this security mechanism is used to identify unauthorized person to get access the networks.

4: Message digests

message digests is a security mechanism which is used to ensure the integrity of a message transmitted over an unsecure channel. messages are passed using a Cryptographic hash function. and it creates a compressed image of the message as known as digest.

5: firewall

firewall is used to prevent unauthorised access.it s used to monitor all incoming and outgoing communications and prevent the unauthorized access and malicious activity.

being the legal,social, and ethical implications of using device or mechanism it is very essential to use these security mechanism to prevent from cyber attacks the security mechanism is used to carry out the security service to protect a network from being attacked by the attackers these security mechanism are designed to detect, prevent, or recover from an attack. The mechanisms also implement  protocol layer tcp or application-layer protocol to prevent the attacks. these mechanism are legal and can be done ethically without breaking any protocols.


Related Solutions

please explain deeply and clearly the security mechanisms to protect the fundamental objective of information security
please explain deeply and clearly the security mechanisms to protect the fundamental objective of information security
Why is it important to have a Network Security? Discuss the use of network security components....
Why is it important to have a Network Security? Discuss the use of network security components. Why is it important to use Firewall for Computer Networks?
Discuss network security in a business ethics.
Discuss network security in a business ethics.
29. Question 29 For added security you decide to protect your network by conducting both a...
29. Question 29 For added security you decide to protect your network by conducting both a stateless and stateful inspection of incoming packets. How can this be done? 1 point You must install 2 firewalls in series, so all packets pass through the stateless firewall first and then the stateless firewall. Install a single firewall that is capable of conducting both stateless and stateful inspections. Install a stateful firewall only. These advanced devices inspect everything a stateless firewall inspects in...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference between types of firewalls.
Discuss the legislation that insures the privacy, confidentiality, and security needed to protect a patient's health...
Discuss the legislation that insures the privacy, confidentiality, and security needed to protect a patient's health information. Describe the HIPAA security safeguards and how these protect the healthcare organization or provider from penalties. Provide substantive responses to two of your classmates.
Discuss different security websites or network and security informational sites that you may already monitor and...
Discuss different security websites or network and security informational sites that you may already monitor and why. Limit the discussion to no more than three sites.
Discuss the limitations and strengths of a wide area network. What are some of the security...
Discuss the limitations and strengths of a wide area network. What are some of the security challenges presented by the increased growth in wireless networking for any organization or individual today?
how is compartmentalization implemented into network security? give in-depth description
how is compartmentalization implemented into network security? give in-depth description
Create a list of how organizations use common safeguards to protect other users on the network,...
Create a list of how organizations use common safeguards to protect other users on the network, such as firewalls, proxy servers, user names and passwords, access controls, and audit trails.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT