All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Individual Project for Network Forensics, Research Paper Example

Pages: 2

Words: 576

Research Paper

Introduction

What may be perceived as a low risk of vulnerability on your network, can quickly change, to that of a high risk and leave you exposed to cyber-attacks and hacking. In this regard all firms operating computer networks should be aware of the risk and have installed a Network vulnerability assessment management tool.  There are a number of these available on the market place today, however in accordance with a survey carried out by Network World the tool by Qualy’s called ‘Qualys-guard’ was deemed to be a clear winner. (Andress, M. 2004)

Distributed Network Attack

A distributed network attack (DNA) may be defined as that of a decryption attack across a large computer network system. Such attacks to gain illegal penetration of a computer network and these cyber-attacks may be to obtain important information from which the person carrying out the theft hopes to make a profit. It may be conducted as a revenge motive or even pure sabotage.  Whatever the motive it is a criminal offence and organizations need to try and protect themselves from such occurrences.

Recovery of Files

Vulnerability remediation and tracking are important features of these tools. They can alert administrators to potential threats and areas of vulnerability in the network system. With DNA you are not restricted to the process power of one machine but can use the power of all the machines contained within the network. This can be used to decrypt passwords. The DNA specific server being installed in the heart of the network where the security manager can co-ordinate operations over the DNA attack.  He is then able to target areas of the network system and distribute small portions of key searches to nodes around the network As such this can be performed as a background activity using only minimal amounts of processing time. (Access Data, 2011).

QualysGuard identifies all of the systems software that resides on the network and performs a venerability assessment against each of them. It identifies all of the wireless access points on the network. The system is flexible to operate and easy to install. It allows tickets to be assigned for remedial actions against vulnerable areas on the network. The system ranks the assets of the business in terms of criticality and then determines the vulnerability level of the assets with remedial actions for improved security. The system provides a mapping function of the entire network. (Andress, 2004).

Network Security Audit

A Network security audit is a verification check concerning the points of vulnerability on a computer network where there may exist points of potential weaknesses for unauthorised access or entry to the computer network. It examines the control features of the system, levels of encryption, firewalls and hardware vulnerabilities. There are three broad areas of vulnerability on a computer network:-

  1. Interception– the points where data that is passing through a network may be intercepted and used for unlawful purposes;
  2. Availability – Examination of geographical dispertion and access around the network and the key areas of vulnerability
  3. Access / Entry Points – the geographical boundaries of the network and the vulnerability of the varying access points contained within the network. How modular is the system and ability to invoke a lockdown in vulnerable parts of the system. (ISACA, 2011)

Works Cited

Access Data. (2011). Decryption and Password Cracking Software. Retrieved 6 26, 2011, from Access Data: http://accessdata.com/products/computer-forensics/decryption

Andress, M. (2004, 11 8). Network vulnerability assessment management. Retrieved 6 26, 2011, from Network World: http://www.networkworld.com/reviews/2004/110804rev.html

ISACA. (2011). Approach to Auditing Network Security . Retrieved 6 27, 2011, from ISACA: http://www.isaca.org/Journal/Past-Issues/2003/Volume-5/Pages/Approach-to-Auditing-Network-Security.aspx

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper