Free Essay

Denial of Service Attacks in Network Security

In:

Submitted By nischal90
Words 2218
Pages 9
Denial of service attacks in Network security introduction and short history of DoS attacks:
Denial of service attacks are one of the major threat to the modern computer networks.It has been said that first DDoS attack was launched in 1999 against the IRC server of university of minnesota which affected 227 systems and server was down for several days.Another DoS attack was documented in the week of feb 7 2000.A 15 year old canadian hacker named “mafiaboy” performed a series of DoS attack against some sites like ebay and amazon.Companies suffered from 1.7 billion of damage.After that it became the best way of hacking among cybercriminals. People used to perform these attacks for profits.Hackers will follow the procedures like mafiaboy and ask for the money.In 2005 ,it became more easy to implement those attacks ,a boy of 18-yr old named Farid Essabar developed a worm called MyTob which used to open a backdoor in Ms windows hosts and connect to the remote IRC server.The computer then used to wait for the commands from the servers.Farid was arrested for distributing the worm.This was surely not the last case.DDoS attacks were used to attack and money extortion.
As name suggests Denial of Service aka DoS, it’s main objective is to make the system to deny the legitimate service requests. Basically DoS attacks are performed by exhausting the resources of the computer like processing power,network bandwidth,TCP connection and service buffers,CPU cycles and so on.Hackers actually overload the service requests to the target server and if required number of services are not being generated by a single computer, then Distributed Denial of Service(DDoS) will be performed.Hacker will use random computers on the internet to attack the victim and since the frequency of the attacks is increased tremendously and there are a lot of unwitting hosts involved ,it is very difficult to prevent those attacks and trace the actual hacker.These days the DoS attacks are frequently occurred due to the extensive use of internet and increment in vulnerabilities.For example wireless network can be victim of DoS attacks as our wireless devices uses same physical media for receiving and sending the signals.In wireless networks an hacker can easily, forge,modify or inject harmful packet to disrupt the network connectivity.
There are tons of ways with which one can perform DoS attacks.As long as the method used can exhaust the resources of target in some way then it will be considered successful method.Some network based and host based attacks are as follows: network based attacks:
TCP SYN flooding:This attacks the part of normal TCP three-way handshake to exhaust the victim’s resources.When client ask for service ,it sends TCP SYN message to the server and server replies by sending SYN-ACK message and waits for client to send ACK message.At this state,server allocates the certain memory to store the information from the client.And it will not be released unless server gets ACK message from the client.Now the malicious client will not send ACK message and this process will occur in every single port and since it will repond to all the requests ,the server will run out of memory which was assigned for half-open connection.

ICMP smurf flooding: ICMP packets are used to test if the computer is responding in a network.The computer to be tested is pinged by sending ICMP packets by another computer and the computer will reply by sending ICMP echo reply packets.In ICMP smurf flooding attack the victim is flooded with tons of spoofed ICMP packets which can exhaust the computer by using up all the resources and the victim will no longer be able to provide its service.
An attacker sends an ICMP packets with the victim’s IP address as a source address and remote network’s IP address as a destination address.The computers on the remote network will reply with the ICMP echo reply packets to the victim and if there is no good security system like firewall to block the forged packets then the victim’s resources may get exhausted and denial of service will occur.

UDP Flooding: An attac ragmented parts and end up having a packet more than 65,535 bytes which will exhaust the memory buffer and victim wont be able to provide the service.

Slowloris: In slowloris an attacker uses a web server to attack another web server targeting only web services.Constant partial HTTP headers are sent to the victim and the request is never completed due to which the victim keeps all the requests which will soon occupy the whole allocate memory which makes the server to not to accept more legitimate requests causing denial of service.

NTP amplification attack:NTP amplification attack is a DDoS attack in which a lot of botnets pretends to be a legitimate client asking for the service. Since the botnets are in tremendous amount asking for the service constantly,there will be loss in resources to some extent and it will get exhausted.Due to this, the server will not be able to provide the service.This type of amplification attacks can be done in some other types of servers such as DNS which is called DNS amplification.

host based attacks:Instead of messing with network protocols , an attacker can attack the application or system on the host.This targets the certain algorithm of a program.Although the attacking traffic is less than the network based attacks ,it is enough to crash the certain application and consume the resources.These types of attacks can be performed by single computer as well as multiple computers on the internet(DDoS)

DDoS attacks: DDoS attacks are same as DoS attacks to some extent.Major difference is that it is performed by multiple computers. In order to perform DDoS attacks an attacker follows two steps.At first it attacks the random computers in the internet to turn it into a zombie and uses it in the attack.This is done in many ways, an attacker can make victims to click on certain file and inject the Trojan horse in the remote computer.The remote computer will not be harmed in any way.The code will just sit somewhere in the computer without getting any attention.This process will be repeated in many computers in the internet.Now these computers are called zombies.
After this,at some point of time, an attacker will make zombies to attack the victim at the same time.It’s not necessary that every single computer will perform the same kind of attack.Either of the computer can perform different type of attack.

Countermeasures of DoS and DDoS attacks: It’s never possible to get fully prevented from DoS attacks however we can get prevented to some extent. In order to get prevented from DoS attacks, there are a lot of vendors who have developed some good technologies like intrusion detection system,firewalls,and secure routers.These devices normally work between servers and internet, filtering the ingress and egress traffic,traffic analysis,address blocking etc.For eg CISCO ios netflow is one of the best IDS which is pretty good in providing key set of services for IP applications.This IDS does a lot of things including showing up peak usage time,traffic routing,peak usage of bandwidth and many more.These information is then compared against the baseline data and if something suspicious is observed,necessary step can be taken.
Nowadays, use of firewalls has been a common thing.Firewalls are basic aspect of today’s network.These firewalls somehow can prevent DoS attacks to some extent.Firewalls can inspect the ingress and egress traffic and can distinguish between legitimate packets and unwanted packets to some extent.Firewalls can control the use of certain ports,protocols ,packet types and and IP address.Some of the advanced routers nowadays can perform these task performed by the firewalls.
Although, we have tremendous amount of security systems,it’s still very tough to get prevented from DoS attacks.At first its really hard to distinguish between legitimate and unwanted packets.An attacker can attack any ports but it’s not possible to shutdown all the ports for security reasons.For eg an attacker might attack on HTTP port 80 sending unwanted packets pretending lige legitimate request.Even if our routers and firewalls are working properly,it’s not hard to overwhelm them by sending tons of requests.
To get prevented from source address spoofing, we need to restrict source address of the traffic inside the network which can be obtained by ingress filtering. This makes connectivity only with legitimate users but not with random IP addresses.This idea of filtering is used in many routers and firewalls nowadays making them more secure.Although we we can’t stop attacker using forged ip address,we can get prevented from subnet spoofing.
We can stop machines from participating in DDoS attack using D-ward systems.This system monitors the ingress and egress traffic of the network and it has ability to discard those traffic which are taking too long to process.We will obviously stop some legitimate traffic.DDoS attacks will surely take place in networks without D-ward system but implementing this system in as many as possible networks will help to reduce the number of zombies.

DoS attacks and its countermeasures in WIFI networks.Wireless technology is integral part of our life.We carry a lot of devices which can access wireless.This is pretty handy way to get connected to the internet but it’s risky in some areas.Since WIFI is an open network means everyone with devices having wireless NIC will be able to observe it, people will always be able to launch DoS attacks by jamming and interfering the packets.These types of attacks will always be enough to exhaust the physical router causing the collision of the packets.In order to prevent this,delivery ratios of poor packets can be observed and location information can be used.Defects of MAC layer can be used by attackers, they may simply exploit some vulnerebilities like carrier sense mechanism and decieve normal nodes.DoS attacks in network layes mainly focuses in routing and some other protocols.It has been observed that DoS attacks in Network layer is pretty different from the other Dos attacks in the internet.Normally a computer in the same network ends up to be an attacker.This way, they just need to flood the packets to the network and since it’s different from other attacks there are no any valid countermeasures for this type of attack.
Attackers can also get control over the ad hoc routing protocols like DSR and AODV and can break the legitimate connections. For eg changing the destination IP address can cause the the network to not establish the legitimate connection.Due to this reason security of routing protocols is important and several other routing protocols are being offered by some people. One of them is TESLA which is considered to be secure to some extent.So when a route request is found ,it authenticates it with TESLA so that attackers will not be able to modify or forge the traffic.
Forwarding behaviour can be exploited by some of the attackers.This can be done by either injecting the unwanted packets,dropping the packets and disordering the packets in a legitimate traffic.This attack is mainly used to exhaust the bandwidth of the network.Attacker normally uses spoofed packets in order to hide itself.In order to get protected from these types of attacks, authentication in every hop can be applied.

conclusion:Finally ,DoS attacks are still the best way for an attacker to exploit the network and exhaust the resources.Nowadays it’s even even easier to perform these attacks due to easy to download attacking tools and and even zombies can be hired.It feels bad to say that we still donot have 100 percent solution for these attacks.The attack types mentioned above are just some examples of DoS attacks.In reality, there are surely uncountable number of attacks.But we can always get prevented from DoS attacks to some extent.For the complete solution of these attacks we need to start global solution.Meaning we need to stop creation of zombies and for this every single of us should be aware of our systems.Updating our operating systems is always better idea for security reasons.Everyone related to this field is trying their best to solve this problem but yes it can never be eliminated because its how internet world works.If solution for one type of attack is generated , people will create another type of attack.But its always good to implement all the possible security measures.

references:
(http://www.britannica.com/topic/denial-of-service-attack)
(http://www.cisco.com/c/en/us/products/collateral/security/traffic-anomaly-detector-xt-5600a/prod_white_paper0900aecd8011e927.html)
(https://www.techopedia.com/definition/17294/smurf-attack)
(https://www.incapsula.com/ddos/attack-glossary/syn-flood.html) https://blog.fortinet.com/post/ddos-a-brief-history security in computing , 5th edition ,charles p.pfleeger
https://s2.ist.psu.edu/paper/ddos-chap-gu-june-07.pdf

Similar Documents

Free Essay

Secure Cloud Node

...SECURING CLOUD NETWORK NODES AGAINST DoS ATTACKS Turnitin Score 15% Boman K. Avong Health Informatics and Administration University of Maryland University College Author Note This research paper is prepared for ITEC 610 9043 taught by Dr. Richard Taylor of the University of Maryland University College Abstract Cloud computing is an emerging technological advancement and in recent times the technology has gained popularity because of its ability to increase system performance, efficient use of computer resources and also scalability. As with any internet technology, security is a big challenge for cloud computing services. Denial of Service (DoS) attacks targeted at cloud end node systems are possible because of how vulnerable these node systems are. The level of security at the node systems is not matched to that at the server level. Cloud node networks are the major entry points for DoS attacks and other malicious attacks in a cloud computing environment. This paper will discuss various DoS attacks and techniques and also discuss the role of Distributed Denial of Service (DDoS) on distributed computer networks. I will also discuss how DoS attacks are the major threats to cloud services, entry points of DoS which are cloud end nodes and recommend how these attacks can be mitigated. DoS attacks on the cloud node computers are the major security challenges cloud services face. I will also recommend techniques that can prevent DoS on cloud node networks. Introduction ...

Words: 2565 - Pages: 11

Free Essay

Information Security Threat Mitigation

...Information Security Threats Mitigation By Francis Nsofwa Mubanga Keller Graduate School of Management Devry University Professor Sandra Kirkland SE572 July 14th, 2011  Table of Contents Introduction 1 Steps 1 Denial-of-Service attacks (DoS) 1 Distributed Denial-of-Service attacks (DDoS) 1 Masquerading and IP Spoofing attacks 2 Smurf attacks 2 Land .c attacks 2 Man-in-the-Middle attacks 3 Conclusion 3 References 4 Introduction Our company faces the largest information security threat and we need to take steps to mitigate the risks associated with each one of them. Steps Denial-of-Service attacks (DoS) We will analyze the attack as best as we can and implement the correct defense. We will ask ourselves if there are any common packet signatures that are easy to filter against. We will ask ourselves if all attackers hitting a single target if they can be sacrificed. We will also need to find out as to which network the attack is coming from, and if we can verify it (remember that spoofed packets can come from anywhere, including our own network). Once we’ve found a reasonable match for the attack, pass the filters to our upstream provider(s) and seek their help getting them propagated outwards. We will need to make sure we filter or redirect traffic with a minimum amount of actual downtime (Kaeo, 2004). Distributed Denial-of-Service attacks (DDoS) CluB: a Cluster-Based architecture is the method we will use to prevent DDoS attacks...

Words: 789 - Pages: 4

Free Essay

Information Security Threat

... Information security threat and the steps we have taken to mitigate the risks associated with these threats. External cyber-attacks are on the rise and have become a real challenge for network administrators as well as network design planners to ensure their respective networks are protected from external attacks resulting in loss of website availability, confidential data, and internal processes critical to mission objectives. Cyber-attacks can cost companies large sums of unrecoverable revenue associated with site downtime and possible compromise of sensitive confidential data. It is imperative today’s corporate network is configured and prepared to protect itself from external cyber-attacks. Since there is no 100% method to stop external cyber-attacks, attention to detail must be made in regards to proper configuration of the network to include state of the art hardware and software. To include current security patches for both software and hardware respectively. Additionally, hardware and software measures will be limited in their effectiveness without network policies and techniques to protect against external cyber-attacks such as Denial of Service, Distributed Denial of Service, Masquerading and IP Spoofing, Smurf Attacks, Land c Attacks, and Man-in-the-Middle attacks. In close coordination with our IS team engineers and IT network director an approved plan has been incorporated to minimize risk of an effective cyber-attack on our network. Specifically...

Words: 735 - Pages: 3

Free Essay

Sec 572 Week 1 Ilab Draft

...572 iLAB 1 Denial of Service Attacks Student Name: Aloysius Jallah Professor: Mark Merkow Name of the attack Denial of service attack (DoS): According to Week 1 TCO, denial of service attack is an attack that considerably reduces the power of the network from appropriately communicating with other networks and/or endpoint users (Merkow 2015). Hence, the end result of the attack is the incapacitation of the target network … rendering it inaccessible to its anticipated end-users through the application of flooding technique. Additionally, if the attacker understands and/or discovers that an intermediary network can give off excessive traffic capacity than the victim network can manage and/or process, the attacker uses the flooding technique to transmit an enormous batch of UDP packets headed for the victim; thus, the end result of this activity can cause flooding traffic congestion and exhaustion of the connection resources of the victim. In cunning attacks, “attacking hosts can flood packets in a burst to congest and disrupt existing TCP connections” (Kuzmanovic et al, 2005). However, for every action, there is equal and opposite reaction. As knowing denial of service (DoS) attack comes into play, software developers and system administrators also come up with the mechanisms and/or solutions to combat, reduce and prevent the potential impact of malicious criminal and/or attackers. Attack discovery and resolution dates: Denial of service (DoS) attacks can be identify...

Words: 1368 - Pages: 6

Premium Essay

Fdess

...Hands-On Ethical Hacking and Network Defense Second Edition Chapter 3 Network and Computer Attacks Objectives • After this lecture and completing the exercises, you will be able to : – Describe the different types of malicious software and what damage they can do – Describe methods of protecting against malware attacks – Describe the types of network attacks – Identify physical security attacks and vulnerabilities Hands-On Ethical Hacking and Network Defense, Second Edition 2 Malicious Software (Malware) • Network attacks prevent a business from operating – Malicious software (malware) • Virus • Worm • Trojan program – Goals • • • • Destroy data Corrupt data Shutdown a network or system Make money 3 Hands-On Ethical Hacking and Network Defense, Second Edition Viruses • Virus attaches itself to a file or program – Needs host to replicate – Does not stand on its own – No foolproof prevention method • Antivirus programs – Detection based on virus signatures • Signatures are kept in virus signature file • Must update periodically • Some offer automatic update feature Hands-On Ethical Hacking and Network Defense, Second Edition 4 Table 3-1 Common computer viruses Hands-On Ethical Hacking and Network Defense, Second Edition 5 Viruses (cont’d.) • Encoding using base 64 – – – – – – – – Typically used to reduce size of e-mail attachments Also, used to encrypt (hide) suspicious code. Represents zero to 63 using six bits A is 000000… Z is 011001 Create groups of four characters...

Words: 1394 - Pages: 6

Premium Essay

Identifying Potential Malicious Attacks

...Identifying Potential Malicious Attacks The CIO Company will use firewalls, intrusion detection systems, virus scanners and other protective software to provide some assurance that the security policies for the site are properly implemented. Firewalls are the basis of computer and network security defense. They are widely deployed. They are very hard to configure properly, and people who configure them may not know the current threats and attacks. For example, an administrator maybe working on some task and might leave something open in a firewall where attackers can enter through. Some firewalls have the vulnerability that enables attackers and be defeated. By identifying the network components, you can evaluate their vulnerabilities. These vulnerabilities can have flaws in the technology, configuration, or security policy. Vulnerabilities can be fixed different ways, applying software patches, reconfiguring devices, or deploying countermeasures such as firewalls and antivirus software.   Threat is when people take advantage of vulnerability and cause a negative impact on the network. If threat occurs it needs to be identified, and the associated vulnerabilities need to be addressed to minimize the risk.  As of today, most of the hackers are interested in hacking services such as HTTP (TCP Port 80) and HTTPS (TCP Port 443), which are open in many networks. By using access control devices, they can detect malicious exploits aimed at these services. Now these days applications...

Words: 1060 - Pages: 5

Premium Essay

Malicious Attacks and Threats

...Malicious Attacks and Threats Malicious Attacks and Threats As the lead Information Systems Security Engineer it is my job to ensure that the ongoing threat of malicious attacks and vulnerabilities to the organizations computer network are kept to a minimum so that highly sensitive data will continue to remain protected. However, recent reports from the CIO suggest that there has been a small amount of malicious activity reported on the network. The CIO is requesting I look into the current network infrastructure and make necessary changes to the network so that the system remains free from the threat and vulnerability of future malicious activity that would impact the organizations network. Attacks on computer systems and networks occur by the billions every year and are on a dramatic increase. Many organizations have invested vast amounts of money in computer networks, only to find out that although it is providing means of improving the efficiency and productivity of the organization it also exposes the organization to possible malicious attacks and threats. Such attacks have been the most challenging issue for a majority of Information System Security Engineers where they utilize the necessary resources to protect the network from these vulnerabilities. The greatest overall threat to computer systems and their information comes from humans, through actions that are either malicious or ignorant. When the action is malicious, some motivation or goal...

Words: 1172 - Pages: 5

Premium Essay

Assignment 2: Identifying Potential Risk, Response, and Recovery

...provide some assurance that the security policies for the site are properly implemented. Firewalls are the basis of computer and network security defense. They are widely deployed. They are very hard to configure properly, and people who configure them may not know the current threats and attacks. For example, an administrator maybe working on some task and might leave something open in a firewall where attackers can enter through. Some firewalls have the vulnerability that enables attackers and be defeated. By identifying the network components, you can evaluate their vulnerabilities. These vulnerabilities can have flaws in the technology, configuration, or security policy. Vulnerabilities can be fixed different ways, applying software patches, reconfiguring devices, or deploying countermeasures such as firewalls and antivirus software. Threat is when people take advantage of vulnerability and cause a negative impact on the network. If threat occurs it needs to be identified, and the associated vulnerabilities need to be addressed to minimize the risk. As of today, most of the hackers are interested in hacking services such as HTTP (TCP Port 80) and HTTPS (TCP Port 443), which are open in many networks. By using access control devices, they can detect malicious exploits aimed at these services. Now these days applications has improve and very hard for hackers to get into but the technology need to stay up to date and be more intelligent. The attack methodology requires firewalls...

Words: 1056 - Pages: 5

Premium Essay

Essay On Cyber Security

...Cyber security is gaining tremendous attention nowadays due to the increasing use of internet, computers by the media and various public and private institutions. They recognize the terrible impacts with the cyber attacks. Cyber security involves preventative methods which are used to protect information from being stolen or attacked. Cyber attack is a crime that involves a computer and a network for stealing and attacking of information. It is an attack where a person uses a computer to commit an illegal act. At present, cyber attacks is the current challenging issue which has resulted in computer based criminal activities which are generating worldwide threat, destruction and disruption. There is no border for cyber activities. The increase in the use of internet by the world wide users and lack of international cyber...

Words: 2239 - Pages: 9

Premium Essay

Selecting Security Countermeasures

...03/30/2014 IS3220 Unit 2 Assignment 1 Selecting Security Countermeasures The primary components that make up a network infrastructure are routers, firewalls, and switches. An attacker may exploit poorly configured network devices. Common vulnerabilities include weak default installation settings, wide open access controls, and devices lacking the latest security patches. Top network level threats include: •Information gathering •Sniffing •Spoofing •Session hijacking •Denial of service Information Gathering Network devices can be discovered and profiled in much the same way as other types of systems. Attackers usually start with port scanning. After they identify open ports, they use banner grabbing and enumeration to detect device types and to determine operating system and application versions. Armed with this information, an attacker can attack known vulnerabilities that may not be updated with security patches. Countermeasures to prevent information gathering include: •Configure routers to restrict their responses to footprinting requests. •Configure operating systems that host network software (for example, software firewalls) to prevent footprinting by disabling unused protocols and unnecessary ports. Sniffing or eavesdropping is the act of monitoring traffic on the network for data such as plaintext passwords or configuration information. With a simple packet sniffer, an attacker can easily read all plaintext traffic. Also, attackers can crack packets...

Words: 650 - Pages: 3

Premium Essay

Web Server Application Attacks

...Application Attacks Web Server Application Attacks Assignment # 1 Mariz Cebron Common web application vulnerabilities and attacks, and recommend mitigation strategies The World Wide Web has evolved into a critical delivery pipeline for institutions to interact with customers, partners and employees. Via browsers, people use web sites to send and receive information via Hypertext Markup Language (HTML) messages to web applications housed on web servers. This information, expected as legitimate messages, can be used illegitimately in unauthorized ways to compromise security vulnerabilities a.) Authentication - one of the biggest web application weaknesses is the failure to provide a means of strong authentication to verify the end user is whom he/she claims. Prior to accessing a web application, a server may require the end user to authenticate him/herself to identify the user or determine the user's access privileges. To mitigate these risks; employ strong authentication, such as HTTPS, with encrypted credentials, require authentication at specified time intervals or movement between web pages, regularly test authentication and implement authorization. b.) SQL injection - Many web applications do not properly strip user input of unnecessary special characters or validate information contained in a web request before using that input directly in SQL queries. SQL injection is an attack technique...

Words: 1656 - Pages: 7

Free Essay

Rlot Task 2

...difficult to combat distributed denial of service (DDoS) attacks. Typically DDoS attacks occur at the network layer by SYN flooding, ICMP flooding, and UDP flooding. Some times DDoS attacks fail at the network layer when this happens cybercriminals shift to application layer attacks. Application attacks occur by sending an overwhelming number of HTTP GET requests (HTTP flooding) or running a massive number of queries through the victim’s database query or search engine. This guide will address the information technology (IT) industry’s best practices to counter denial of service (DoS) and DDoS attacks. These countermeasures are patch management program, antivirus software, and host-based intrusion prevention systems. Patch Management Program One important aspect of security is patch management. Patching is software code that a vendor distributes to fix functionality problems or vulnerabilities for applications and network devices. Without a patch management program hackers could exploit vulnerabilities to gain access into the university’s information system, elevate privileges, and steal data. The amount of patches released can be overwhelming to the university’s network technicians. The patch management program will ensure that security risks are reduced to an acceptable level and reduce manpower requirements. The university will use an automated patch management system which will include the installation of a client agent. Each host on the network will be required to run the agent...

Words: 979 - Pages: 4

Premium Essay

Introduction to Network Security

...University Unit 2 Assignment A Denial of Service (DoS) Attack is an attempt to disrupt a company’s network and services by preventing access to resources by users authorized to use those sources like a company’s employees and customers (Dulaney, 2009). When one person attempts this from a single system it is called a DoS attack, but when a group of nodes on a network simultaneously flood the site with attack packets it is called a Distributed Denial of Service attack or DDoS. These attacks are meant to disrupt the company’s website and gain access to its computers. To accomplish this, the Attacker will recruit vulnerable machines on separate networks, mainly ones not running antivirus through different scanning techniques and will then install an attack toolkit to the machine making it a Zombie or Slave (Patrikakis, Masikos, Zouraraki, 2004). Then the infected computer will look for other vulnerable computers in which it can install the attack toolkit using the same process and creating an army of computers (Patrikakis, Masikos, Zouraraki, 2004). Once this army is assembled the attacker can wake up all of the slave computers, now on his network and have them all send attack packets to the company’s IP address and can even use spoofed source IP address. This way the slave computers IP addresses are hidden so the victim cannot trace the attack back to them. This will combine a DDoS attack with a Spoofing attack. Protecting against DDoS attacks are difficult if not impossible...

Words: 1012 - Pages: 5

Free Essay

Executive Proposal

...team of Advanced Research (AR), Reston, VA | From: | Samuel Majekodunmi, IT Manager. | Date: | Aug. 30th 2015 | Subject: | The Reasons Advanced Research needs Kali Linux to Enhance and Test Security. | | Purpose | | The purpose of this proposal is the present the executive team of Advance Research (AR) a solution to recent strings of security breaches. The goal of the proposal is to persuade the executive team of Advanced Research to invest personal for the sole purpose of constant testing of network security and vulnerability; therefore ensure AR’s safety of intellectual property. Table of Contents Executive Summary……………………………………………………………………….2 Introduction………………………………………………………………………………..2 Recommendations…………………………………………………………………………3 Budget……………………………………………………………………………………...4 References………………………………………………………………………………….4 Executive Summary Advanced Research (AR) is on its way to becoming a major player in the medical research and development industry. However, suspicion that the corporate network infiltrated from unauthorized sources more than once, indicated the lack of solid security measures. The false allegations of unethical research and development practices are proof of such accesses. Despite the security troubles and false allegations, AR has experienced a 40% increase in business and as result of the increase AR has hires more stuff. The increase traffic is another indication that AR needs a sure and...

Words: 1213 - Pages: 5

Premium Essay

Nt1310 Unit 7 Exercise 1

...1. Data rate is the amount of data that transmitted through a connection. Data rate takes several forms, among them are: bit per second, kilobit per second, megabit per second, and gigabit per second. Data rate is possible to use based on performance characteristic. The way to address data rate is via software based configuration or hardware based. Data rate is no possible to be higher than bandwidth. Error rate is relevant that consist of data link such as fibre optic, Ethernet, and system which sending data via network form that is possible to raise degradation of digital signal. An error into a system is possible to happen when data is communicating over data link. Rate that issues is shown in transmission is called as error rate. Data rate address in Bps is known as bandwidth. One of common thing is twisted pair cable, it have different series of cable, and they are Cat3, Cat4, Cat5, Cat5e, Cat6, and Cat6e. Those series have a similarity but they are having a different limitation of speed, like Cat5 is owning 10Mbps and 100Mbps speed capacity, Cat6 is possible to send data up to 10Gbps....

Words: 515 - Pages: 3