Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Term Paper: Current Attack Vectors and Secure Network Design Due Week 10 and wor

ID: 3675082 • Letter: T

Question

Term Paper: Current Attack Vectors and Secure Network Design

Due Week 10 and worth 160 points

A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 employees within the next 18 months and is preparing to build his systems infrastructure across three (3) locations: one (1) primary headquarters and two (2) small satellite offices. All three (3) locations will occupy one (1) entire floor of a multitenant building. Your friend has asked your opinion regarding major technology choices that he must make for his business, such as operating systems, mobile devices, cloud services, and wireless networking.

Write a six to ten (6-10) page paper in which you:

Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.

Discuss the primary security concerns surrounding USB and other portable devices, and prioritize the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause.

Take a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack.

Suggest the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Justify your response.

Consider the use of cloud providers to allow for access to data for employees and potential clients.

Examine the general security concerns for cloud-based solutions, and validate whether or not you would consider the use of a cloud provider an optimal solution for this scenario.

Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack.

Support your response with related examples of the chosen tool in use.

Recommend the minimum physical and technical controls for protecting the company’s intellectual property from both internal and external threats. Provide a rationale for your response.

Consider the tools explored throughout the course, and suggest what you believe to be the three (3) most useful tools for a hacker to utilize. Justify your response.

Explanation / Answer

Linux has the best security as compared to windows and macintosh.This is becaus eof the following reasons :

1.The privileges: The linux systems have a key advantage that account privileges are assigned. In Windows, users are generally given administrator access by default, which means they pretty much have access to everything on the system, even its most crucial parts. So, then, do viruses. It's like giving terrorists high-level government positions.This results in more attacks on the windows as compared to linux. Linux does have root privileges rather, they're typically given lower-level accounts.If a given a Linux system is compromised, the virus won't have the root access it would need to do damage systemwide; more likely, just the user's local files and programs would be affected..The attack wont become big as compared to a windows attack.

2.Social Engineering:

Most of the viruses and worms often spread by convincing computer users to open attachments that carry viruses and worms. This is called social engineering, and it's all too easy on Windows systemsThis can just happen by provoking a user to open a attachment and the virus can spread to the system.On the other hand Linux users don't have root access, however, it's much harder to accomplish any real damage on a Linux system by getting them to do something foolish.

3.The Monoculture Effect:Windows is used more widely and is diverse.As a result the number of attacks happen on windows systems more often as compared to linux.This results in an increase in the number of attacks.

4.Audience size:Hand-in-hand with this monoculture effect comes the not particularly surprising fact that the majority of viruses target Windows.

The various security concerns related to USB are:

1.Data leakage:They are small in size and can be easily accessed.It can pose a threat to integrity,confidentiality of data if it is found by an unknown person,he can modify the data present in usb and misuse it.

2.Malware infections:Usb usually transfer files between computers which may be on different networks or in different offices, owned by different people.This has further resulted in making USB flash drives a leading form of information system infection. When a piece of malware gets onto a USB flash drive it may infect the devices into which that drive is subsequently plugged into.

Wireless conenctions are more susceptible to attacks.This is because it allows multiple devces to conenct to a given network and allows data to be transmitted between various people resulting in more data and more intruders to access the network.It is difficult to manage a large numebr of intruders.While in a wired conenction ee have only one computer connected to ethernet where outside users cannot enter as much as in a wireless conenction.

The various risks assoicated with cloud based solutions are:

1.Data loss: the prospect of seeing your valuable data disappear into the ether without a trace.

2.Account or service traffic hijacking. It adds a new threat to this landscape,,. If an attacker gains access to your credentials, he or she can eavesdrop on your activities and transactions, manipulate data, return falsified information, and redirect your clients to illegitimate sites.

3.Denial of service :The user might not eb allowed a particular resource due to this attack.

4.Cloud abuse, such as a bad guy using a cloud service to break an encryption key too difficult to crack on a standard computer.

The most effective attack against mobile computing devices are:

Distributed denial of service (DDoS) attack against the mobile telecommunications infrastructure of a big city. The attack exploits the delays in the delivery of messages to overload the network.

The attacker can act as a man in the middle and get into the network by breaking into the password of the network and as a result can manage the network flow of data and stop the data flow by obstructing the data.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote