Question

In: Computer Science

security threats briefly explain the meaning and possible countermeasures for each of the two. 1. Alteration...

security threats

briefly explain the meaning and possible countermeasures for each of the two.

1. Alteration

2. Denial of service

Solutions

Expert Solution

1.Alteration - Attackers usually insert some malicious files that change the configuration of a network or a system and also changes some important user credentials and gain access to sensitive data. This changes in the data is called as Alteration.

The possible countermeasures for Alteration is:

1. Enforcing encryption

  It is the process of translating data from one form into another that cannot be decrypted by unauthorized users. Without knowing the decryption key the hacker cannot read the data.

2.File integrity monitoring

It is the process of monitoring the files to check if any changes is made in the file. It assess system files and generates cryptographic checksum as a baseline.

3.Worm systems

write once read many systems , in this system the data once written cannot be rewritten or modified or erased.

4.Using HMAC

Hash based message authentication. In this when two or more parties exchage data through secure file transfer Protocols the data is accompanied by HMAC . It consists of shared key and a hash function. A shared secret key helps ensure authenticity of the data.

2. Denial of service

It is a type of attack which consists on reducing or cancelling the capacity of servers or the computing resources to provide service.

Countermeasures taken:

Network protective

since it is the entrance path to provided service so measures are taken in the network by installing routers between the network and the ISP so that security layer so that security layers such as accesss control list based on requesting Ip address and or firewall may be implemented.

Infrastructure protective

It is protecting of server and other network devices such as routers or switches. In such devices it is necessary to verify software status regularly. If software is not automatically updated the software version on each device must bethe most recent version capable of solving any detected security problem or vulnerability.

Web application protective

Fist step is to install any recently released security update as soon as possible . If application is specifically developed audits must be conducted in order to identify and solve any security problems. Beside this cpatcha system is advisable on website forms and also use TLS protocol.


Related Solutions

Question: Answer briefly questions below: 1.    What is ERC and its meaning 2.    List two possible ways to...
Question: Answer briefly questions below: 1.    What is ERC and its meaning 2.    List two possible ways to measure investor's earnings expectations. 3.    What are narrow window studies and wide window studies in accounting research, and what are they used for respectively. 4.     List Fair value hierarchy according to IFRS 13, ASC 820-10
1. What are the new threats to human security in the era of globalization? 2. Two...
1. What are the new threats to human security in the era of globalization? 2. Two individuals have become whistleblowers: Edward Snowden abd Julian Assange. They believe that their choices prioritize human or individual rights over nation-states security. Do uou think that their arguments are valid? Why or Why not? Please explain with a lengthy explanation.
briefly explain the meaning of the terms as they relate to this experiment. 1. forward reaction...
briefly explain the meaning of the terms as they relate to this experiment. 1. forward reaction 2. reverse reaction 3. chemical equilibrium 4. endothermic reaction
1. Explain briefly the meaning of price leadership model in oligopoly market?
1. Explain briefly the meaning of price leadership model in oligopoly market?
Explain briefly meaning of environment scanning in business?
Explain briefly meaning of environment scanning in business?
Explain briefly why each of the following is not a possible set of quantum numbers for...
Explain briefly why each of the following is not a possible set of quantum numbers for an electron in an atom. In each case, change the incorrect value to make the set valid. What is the correct value for each set? a) n = 4, ℓ = 2, mℓ = 3, ms = + ½ b) n = 3, ℓ = 3, mℓ = 0, ms = – ½ c) n = 3, ℓ = 2, mℓ = – 1,...
a) Definition of terms.Please briefly give the meaning of each of the following terms: 1. colligative...
a) Definition of terms.Please briefly give the meaning of each of the following terms: 1. colligative property 2. vapor pressure 3. semi-permeable membrane 4. osmosis 5. dialysis
One of the security threats is confidentiality breach. Explain what it is, how it can be...
One of the security threats is confidentiality breach. Explain what it is, how it can be detected and how it can be prevented.
What are the two largest threats to biodiversity and why? What are possible solutions to minimizing...
What are the two largest threats to biodiversity and why? What are possible solutions to minimizing the effects of these factors? The written response should be approximately 200-300 words. You could use definitions, concepts or examples – you can choose these! This part of the assignment is an open-ended response, meaning there is no absolute right or wrong answer – I want you to compose a response that is justified with simple concepts from 1st year biology – so be...
Explain briefly each of the following economic terms. Try to be as concise as possible. Over-the-counter...
Explain briefly each of the following economic terms. Try to be as concise as possible. Over-the-counter (OTC) market (as one kind of financial markets) Secondary market (as one kind of financial markets) Risk premium (of bonds) Yield to maturity (of bonds) Liquidity (of an asset) Federal funds
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT