Site Loader

Inthis exercise, we will discuss the given network system in the portfolio tofind about the intruder’s level of access and the other things. The wholeexercise is dedicated to the whole network which is vulnerable to the intruderand could be open to some serious security breach.

Priorto examining the network system, we will go through the dome of the basics ofthe attacks in the cyber security programming.Attacksare actions taken to harm a system or disrupt normal operations by exploitingvulnerabilities using various techniques and tools. Attackers launch attacks toachieve goals either for personal satisfaction or recompense. The measurementof the effort to be expended by an attacker, expressed in terms of theirexpertise, resources, and motivation is called attack cost. Attack actors arepeople who are a threat to the digital world (Sanders et al.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

, 2013). They couldbe hackers, criminals, or even governments. An attack itself may come in manyforms, including active network attacks to monitor unencrypted traffic insearch of sensitive information; passive attacks such as monitoring unprotectednetwork communications to decrypt the weakly encrypted traffic and gettingauthentication information; close-in attacks; exploitation by insiders, and soon. Common cyber-attack types are: (a) Physical attacks: This sort of attacktampers with hardware components. Due to the unattended and distributed natureof the IoT, most devices typically operate in outdoor environments, which arehighly susceptible to physical attacks (Landau, 2017).

 (b) Reconnaissance attacks – unauthorizeddiscovery and mapping of systems, services, or vulnerabilities. Examples ofreconnaissance attacks are scanning network ports, packet sniffers, trafficanalysis, and sending queries about IP address information.. (c) Denial-of-service (DoS): This kind ofattack is an attempt to make a machine or network resource unavailable to itsintended users.

Due to low memory capabilities and limited computationresources, the majority of devices in IoT are vulnerable to resource enervationattacks (Hyder, 2013). (d)Access attacks – unauthorized persons gain access to networks or devices towhich they have no right to access. There are two different types of accessattack: the first is physical access, whereby the intruder can gain access to aphysical device.

The second is remote access, which is done to IP-connecteddevices. (e) Attacks on privacy: Privacy protection inIoT has become increasingly challenging due to large volumes of informationeasily available.While going through thenetwork we find the different types network traffic flowing through the system.1.

Bursty Traffic-The process of broadcasting of relatively high transmission of data over a veryshort period of time is bursty traffic. The bursty traffic could be found inthe system somewhere and sometimes when an important message is broadcast toall the resources quickly (Taylor Jr, 2014).2.

Interactive Traffic-The interactive traffic could be found at the maximum points in the network andit is quite poor in performance.3. Latency sensitivetraffic- Especially in the WAN system there aresome delays in the message sending and receiving between the systems which arecalled. This traffic is more dependent on the latency is quite hindered by thelatency.  Exercise 5:Entry, Exploitation, and PivotingThisexercise is purely based on the network model given in exercise 4 and we willdiscuss the entire network. The aim of this exercise is to practically think asan attacker to find out the possible ways of exploitation for this network.

Wehave gone through the entire network and find out the below possible ways thenetwork could compromise to find entries and other information. USB Thumb drive-As the given network is consist of number system that can become into contactwith any outside source easily the thumb drive via USB is a possible threat.The attackers used this technique to infect the firewall of any system from theinside by slipping a malware into it. The method is low cost and less dangerousas a person with any excuse can inject the USB thumb drive to any of thecomputer and infect the whole network to control the security (Hogg , J2014).Wireless point Access-The wireless point access is the possible attacking point for the attackers andanyone can connect to the network within the proximity of the network.

Theattackers use the Wireless APs most of the point as it is easily reachable andwon’t get easily caught. Wireless access points are mostly insecure doesn’tmatter the encryption is used or not, they just weaken the network security.Miscellaneous USB devices-The entire network of the organization contains mostly the hardware devices withUSB support. This is quite easy for the attackers to inject any of themiscellaneous USB devices with the spyware in it to breach the network security(Amestoy et al.

, 2015).Inside Connections- Sometimes employees or the users in the network access the part of thenetwork where they are not allowed. Accessing the unauthorized part of thenetwork also puts the security of the entire network at risk.Human Trojan-Mostly people are aware of the Trojan Horse that is a most dangerous virus thatinfects the system and breaches the security for the attackers.

There are alsohuman trojans who targets the organization directly, he could be in client’sdisguise or well suit attire. The Human Trojan gains the trust of the companyand then attack the system with possible tools once get the access to thesystem (Hogg & Scott, 2013). Smartphones and otherdigital devices – Now, the world is being driven bythe smartphones and possible these smartphones are way more powerful thancomputers due to mobility and compactness. The smartphones are the favoritetools of the attackers if this generation and the network can easily bebreached with the small smart device. Theabove mentioned are the possible ways of exploiting the network using thesoftware vulnerabilities in the system (Alonso et al.

, 2014).  

Post Author: admin

x

Hi!
I'm Dora!

Would you like to get a custom essay? How about receiving a customized one?

Check it out