CISY478-InClass Exercise_Information Security - 02-07-23

.docx

School

Virginia State University *

*We aren’t endorsed by this school

Course

478

Subject

Computer Science

Date

May 6, 2024

Type

docx

Pages

2

Uploaded by MegaBee4187 on coursehero.com

CISY 478 - Spring 2023 In Class Exercise for February, 2023 Instructor: Dr. Adeyemi A. Adekoya Exercise Objectives 1. Demonstrate the ability to identify different types of network attacks. 2. Demonstrate the ability to recommend solutions to manage network security. Exercise Overview A large organization with headquarters in New York, London, and Sydney, owns and uses an extensive Virtual Private Network (VPN). Recently, the organization's network was attacked on various fronts. In the first instance, an attacker (HACKER) created a network of infected computers and sent out an instruction for each of those computers to send a request to one of the organization's primary servers. When the server received over 3 million simultaneous hits, it became overwhelmed and failed. In the second instance, an attacker located an active port that wasn't in use and plugged in to it to gain physical access to the network. From there, the attacker used Address Resolution Protocol, or ARP poisoning to listen in on a conversation between two hosts. The attacker spoofed the media access control, or MAC, address of each host to redirect traffic to the attacker's PC and gained access to private login credentials. Finally, many employees were using the company’s computers and network resources to access social media Web sites (e.g., YouTube, Facebook) and in some cases Web sites with malicious code or inappropriate content. Not only did such non-work related Web visits result in high consumption of the company’s network bandwidth but in a handful of occasions, they caused the company’s systems to be infected with malware infections. Task: Identifying Attacks and Recommending Securing Controls You need to make recommendations regarding how the organization's network may be better secured to avoid similar attacks in future. Specifically, carry out the following instructions: Number Instructions 1 Identify and describe the different types of attacks that were executed against the network. 2 How can large organizations with extensive infrastructures, such as the one described in the given scenario, control and restrict remote access to their networked resources? 3 With respect to the second attack, how can you protect physical ports so an attacker can't plug in and gain access to the network? In what ways can you improve port security? 4 How can large organizations with extensive websites visits by their employees, such as the one described in the given scenario, conserve on their bandwidth use and control its employees’ access to Web sites? 5 For a large organization with extensive infrastructures, such as the one described in the given scenario, identify at least 4 different ways through which you can monitor network traffic and detect vulnerabilities that could be exploited to launch network attacks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help