Question

In: Computer Science

what can be the impact of a computer network attack? Where in your networks would you...

what can be the impact of a computer network attack?

Where in your networks would you place a router, compared to a switch and how do the two devices work with an IDS and a firewall to protect the LAN from attack? Why?

Solutions

Expert Solution

Serial A)

The problem is that defining information warfare and information operations in these broad terms does little to focus defenses against current and new threats that take advantage of new weapons systems opportunities -- the threat and use of Computer Network Attacks ("CNA"). When the Countries addresses certain "strategic" centers-of-gravity such as a country power grid, stock market or banking system, are you able to actually target centers-of-,mvity that can approach strategic devastation.

"weapons" and targets include hack attacks, malicious software, back doors, destructive microbes, attacks on the banking system, denial of service, and disruption of national systems such as the air traffic control system, power grid or telephone systems, that could result in the "electronic Pearl Harbor" .

CNA targets in four distinct types of vulnerabilities

Major physical infrastructure elements such as bridges, dams, canals, pipelines, and rail switching points. Obvious military "Achilles' Heels", such as submarine communications antennas, military sea departure channels, electrical power and communications supporting commands Vulnerability of core data streams such as military logistics, transportation status, financial accounts and financial transfers Vulnerability of the Intelligence Community to physical and cyber attacks against communications downlinks, Joint Intelligence Centers, global geo-spacial data.

Serial B)

Intrusion Detection System (IDS)

Intrusion Detection (ID) is the process of monitoring for and identifying attempted unauthorized system access or manipulation. An ID system gathers and analyzes information from diverse areas within a computer or a network to identify possible security breaches which include both intrusions (attack from outside the organization) and misuse (attack from within the organization).

An Intrusion Detection System (IDS) is yet another tool in the network administrator’s computer security arsenal. It inspects all the inbound and outbound network activity. The IDS identifies any suspicious pattern that may indicate an attack the system and acts as a security check on all transactions that take place in and out of the system.

Types of IDS

Network intrusion detection system (NIDS)

Host-based intrusion detection system (HIDS)

Perimeter Intrusion Detection System (PIDS)

VM based Intrusion Detection System (VMIDS)

Serial C)

Comparison with Firewall

Though they both relate to network security, an intrusion detection system (IDS) differs from a firewall in that a firewall looks outwardly for intrusions in order to stop them from happening. Firewalls limit access between networks to prevent intrusion and do not signal an attack from inside the network. An IDS evaluates a suspected intrusion once it has taken place and signals an alarm. An IDS also watches for attacks that originate from within a system. This is traditionally achieved by examining network communications, identifying heuristics and patterns (often known as signatures) of common computer attacks, and taking action to alert operators. A system that terminates connections is called an intrusion prevention system, and is another form of an application layer firewall.


Related Solutions

Explain what is meant by computer network and describe the various types of networks. Your response...
Explain what is meant by computer network and describe the various types of networks. Your response should be at least 200 words in length.
How would you secure computer networks if you could design the Internet? What technologies would you...
How would you secure computer networks if you could design the Internet? What technologies would you deploy or develop to meet the need? CMGT/442
Computer Networks A client-server system uses a satellite network, with the satellite at a height of...
Computer Networks A client-server system uses a satellite network, with the satellite at a height of 20,000 km. What is the best-case delay in response to a request?
What are interfaces? Explain the network adage, "Switch where you can; route where you must."
What are interfaces? Explain the network adage, "Switch where you can; route where you must."
Describe how the Heartbleed attack happens. What is the type of this attack? Where does the...
Describe how the Heartbleed attack happens. What is the type of this attack? Where does the vulnerability exist? Describe the vulnerability and how it is exploited? Describe the consequences of the attack?
What subnet mask would you use for the 178.32.0.0 network, such that you can get 50...
What subnet mask would you use for the 178.32.0.0 network, such that you can get 50 subnets and 1000 hosts per subnet? Please show work.
ANSWER THESE NETWORK QUESTIONS, READ THEM CAREFULLY(1- 7) These are Computer Networks Questions, Calculations & MCQS...
ANSWER THESE NETWORK QUESTIONS, READ THEM CAREFULLY(1- 7) These are Computer Networks Questions, Calculations & MCQS 1. "Host A is sending a file to Host B. There are 3 links (therefore 2 switches) between the hosts. The file is segmented into packets of 40 bytes, with a 10 byte header added to each packet. Each link has a transmission rate of 100 kbps and a speed of 1000 km per sec. The switches are 100km away from each other. Host...
What are some of the basic precautions a computer owner or network administrator can take to...
What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure? What are some of the basic security threats that a user or administrator might have to face?
What are the different networks and areas where security policies must be adapted? Explain in your...
What are the different networks and areas where security policies must be adapted? Explain in your own word? Personnel safety Equipment safety Environmental impact Please dont just copy it from the internet Production loss Data loss
Computer Networks Hi guys. Please can you assist me in answering these questions. I will greatly...
Computer Networks Hi guys. Please can you assist me in answering these questions. I will greatly appreciate it. 1. Packets with sequence numbers 0, 1, 2, 3, 4 and 5 have all been sent to the receiver. The receiver has received packets with sequence numbers 0,1,3 and 4. In which protocol will packets with sequence numbers 2, 3 and 4 be resent? a. Stop and wait b. RDT3.0 c. Go-Back-N d. Selective repeat e. None of the above 2. A...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT