Suitable Network Analysis Tool, Essay Example
This paper provides details of a suitable network analysis tool in order to examine the system network for potential vulnerabilities and threats. This is examined within the context of systems forensics in order to allow the Company to make an informed decision on the most suitable application for the firm. There are a range of products available on the market but the assessment moved towards the product ‘Tennable Nessus’ as being the most feature rich and supporting good client references that support the products quality and capability. (Tenable Nessus, 2011)
A distributed network attack (DNA) relates to a cyber-decryption attack over the entire system network. This is an illegal attack where the hacker hopes to obtain personal information for profit motivated purposes. Information Technology has become the life-blood of virtually every organization. Most large business operations contain Data Centre’s of expensive computer and communication systems (hardware) and important client information and programs (software). Together they provide the central back-bone of the organization and as such any threat to these systems can be extremely disruptive and costly to the business. ..
Recovery Of Files
Tools like Nessus provide a range of network vulnerability tests and tracking features. The objective being to alert the system administrator to possible intrusions and potential threats. The dynamics of the software is such that it does not rely upon one dedicated security system server but can operate on all of the machines (nodes) throughout the entire network. Important features of this incorporate the potential of password decryption. The actual DNA server itself resides at the very core of the network allowing for supervision over the entire network framework. This facilitates both management of the network and the ability to conduct target searches over perceived problem areas. This reduces both cost and processing time.. (Access Data, 2011)
Internet Crime and particularly illegal entry into other computer systems i.e. hacking is deemed to be a Federal Offence in the USA and falls under the investigative jurisdiction of the Federal Bureau of Investigation (FBI). Criminal computer hacking has been legally defined as any person who willingly and knowingly commits an act of cyber terrorism, credit card fraud, malicious vandalism, identity theft or other cyber-crime by hacking into a Corporate or Government system. Such criminal acts are treated very seriously in the USA and will be subject to harsh penalties (Andress, M. 2011)
Network Security Audit
A Network security audit is a verification check concerning the points of vulnerability on a computer network where there may exist points of potential weaknesses for unauthorised access or entry to the computer network. It examines the control features of the system, levels of encryption, firewalls and hardware vulnerabilities. There are three broad areas of vulnerability on a computer network 1) Interception 2) Availability and 3) Access entry points.
What has made this a nightmare for the security manager is the fact that data can be easily copied onto small storage devices, laptop and portable computers. This has intensified the need for improved security techniques over data and particularly that of data encryption. One method being the increased use of data encryption which uses algorithms and mathematical constructs to scramble the data into a non-readable format and can only be decrypted by having the relevant unlock key. (ISACA, 2011)
Access Data. (2011, 11 19). Decryption and Password Cracking Software. Retrieved from Access Data: http://accessdata.com/products/computer-forensics/decryption
Andress, M. (2011, 11 18). Network vulnerability assessment management. Retrieved from Network World: http://www.networkworld.com/reviews/2004/110804rev.html
ISACA. (2011, 11 18). Approach to auditing network security. Retrieved from ISACA: http://www.isaca.org/Journal/Past-Issues/2003/Volume-5/Pages/Approach-to-Auditing-Network-Security.aspx
Time is precious
don’t waste it!