Monday, June 10, 2019
Network Security Questions Assignment Example | Topics and Well Written Essays - 500 words
Network Security Questions - Assignment ExampleBotnets mainly saddle harmful mails in form of spam campaign messages to the target points of the attackers. The botnet can therefore spread as viruses, Trojans or worms through emails and websites.The objectives of botnet attack are to alter the attackers spy on the victims and gain access to sensitive information such as financial statements. They steal the victims credentials and hijack banking information, ultimately leading to steal of money. Their transactions run concurrently with those of their victims. The attackers can also use botnet to access the system source codes.Botnet attackers can use their victims computers and resources for sending malicious spam. These can past spy other victims and execute denial of service command against them. The victims spend a lot of money as well as time to recover from the consequences. Worse still, botnet attacks can land victims into legal challenges. It is not easy for the victim to re alize from the onset that the sender of the malware is in fact a fellow victim. In that case, the end victim may take sue the supposed attackers.On the other hand, Proxy firewalls are intermediate barriers that accept all traffic instructions moving into a network. It achieves this through impersonation of the actual receiving point of the traffic in the network. From the results of inspection, it grants or denies access and the placeholder firewall relays feedback to the reference. After the destination replies, proxy firewall ends the connection. Only one of the two computers remains connected to the global network.ACLS are not capable of reading past packet headers. This gives only prefatorial details concerning the network. In this regard, ACLs packet filtering is not sufficient in itself to eliminate network threats.Proxy firewall demands that every application require a separate proxy at the level of each application. Proxy firewall network suffer
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.