This Essay Is About Secruity Risk List Four Possible Security Risks That The Bank And The Clients Are Facing In The Present Network Setup. Explain Clearly Why These Security Risks Exist.

1481 words - 6 pages

Question 1a. List four (4) possible security risks that the bank and the clients are facing in the present network setup. Explain clearly why these security risks exist.There are 4 possible security risks that the bank and the clients are facing in the present network setup.Firstly, there may be a possible security risk of interception occurs. Interception means that unauthorized party gain access to an asset. Because client send their transaction data which contains personal and sensitive data to the bank's Web server through the Internet. Without any security measures to protect the data, these data will easily been accessed by somebody.Secondly, there will be modification of data occurs in the present network setup. Modification means the unauthorized party gain access to an asset and tampers with the asset. In the present network setup, there is no security measure to ensure that unauthorized party cannot gain access to the data and tempers with the data. For example, unauthorized party may access to the transaction data and modify the content. Modification of data would occur between the communication of the client and the bank's web server and the bank's internal network.Thirdly, there may be a possibility of Denial of service occurs. A denial of service attack is used by an individual to destroy, shutdown, or degrade a computer or network resource. The goal of such attacks is to flood the communication ports and memory buffers of the targeted site to prevent the receipt of legitimate messages and the service of legitimate requests for connections. A denial of service attack might be used to bring down a server that a hacker wants to spoof. For example, a hacker may attempt to spoof the bank in order to obtain PINs or credit card numbers.Finally, there may be a potential risk of Masquerade occur. Masquerade means that n intruder pretends to be a legitimate user. Many other types of attack are built on masquerade as the first stage. Masquerade can use both technological and non-technological means. For example, somebody can learn the other's passwords by observing passing traffic on a LAN, called sniffing. Using a computer to exhaustively guess passwords until the correct one is found, called password cracking.b. List three (3) security measures that are needed to protect the bank's internal network. Explain clearly why these security measures are needed and in what ways they can give protection.Firstly, the bank should use router and firewall to protect the bank's internal network. Requests must filter through a router and firewall before they are permitted to reach the server. A router, a piece of hardware, works in conjunction with the firewall, a piece of software, to block and direct traffic coming to the server. The configuration begins by disallowing all traffic and then opens holes only when necessary to process acceptable data requests, such as retrieving web pages or sending customer requests to the bank. Firewall can limit the...

Find Another Essay On This essay is about secruity risk List four possible security risks that the bank and the clients are facing in the present network setup. Explain clearly why these security risks exist.

Network Security Essay

1567 words - 6 pages example, network security is used to protect the money you have at your bank. More and more things are being tracked on computers, it's essential to understand how to protect it from getting into the wrong hands. Who are we protecting ourselves from? It's an unfortunate thing to think about but we are protecting ourselves from ourselves. Although it seems like this is all new, we have always protected ourselves in one way or another

Network Security Essay

1286 words - 5 pages Network Security Network security is a problem that network administrators face. It is something that network administrators should keep a careful eye on. For example, if the home network does not have any security measures in place, then the person is at a high risk of data loss due to hacking. Network security is something that businesses do not take very lightly because they want to protect their valuable information and network

Network Security

2198 words - 9 pages this may seem quite minor, it is not. Do you really want strangers to know all of the huge purchases you've made of booze and cigarettes? Do you want people to know you're a boozing smokestack? What about your credit bureau? Boy, if your credit bureau gets mixed up, that could keep you from getting a house. It could keep you from a lot of things. Your dreams could fade away, all because of fraud. Quite clearly, network security in today's

Network security

2852 words - 11 pages the system. This is an attack on authentication . an example of this is when the insertion of spurious messages in a network or the addition of record file. 2.4 Methods of securing business information Most of today's network needs to meet all possible security measures in terms of securing the business information. The protection against the business information is depends on how much security issues concerned and these can be distributed

Network Security

1735 words - 7 pages spread with ease via email attachments, floppy disks, Web downloads, file transfers, and cooperative applications. Popular applications that support macros (such as Microsoft Word and Microsoft Excel) are the most common platforms for this type of virus (www.acm.org). These viruses are written in Visual Basic and are relatively easy to create. Macro viruses infect at different points during a file's use, for example, when it is opened, saved

Network Security

3522 words - 14 pages outside of the corporate firewall (Blackberry, 2006). Group-based administration is another service that is provided by Black Berry Enterprise Server v4.1. It enables the IT staff to handle security policies, email filters and application access to different groups. This feature also protects patient’s privacy. For example, you may have Doctors in one group, while nurses are in another. You could even break that down to types of doctors and

Network Security.

977 words - 4 pages A secured network is something that not only businesses but also regular day to day people with personal computers must have. Unless you want a computer that will start to run slow and/or is infected with many different types of viruses which will ultimately lead to the crash of your system then it is a good idea you invest in network security. "The term virus refers to malicious software that requires help from computer users to spread to other

Cryptography and Network Security

1476 words - 6 pages Variable Length) – This is a hash algorithm that contains many levels of security. It is capable of creating hashes that are 128, 160, 192, 224 or 256 bits in length. All the different types of cryptographic algorithms compare themselves to each other in a similar manner. The levels of security and the size of the keys or messages are the main changing aspects. The methods listed above are only a small number of the many cryptographic algorithms

Explain how mortgage backed securities are issued. Present evidence of the main issuers of these securities and explain the main reasons they issue these bonds.

948 words - 4 pages Present evidence of the growth in the importance of non-government bond issues over the past five years (to2005). Explain how mortgage backed securities are issued. Present evidence of the main issuers of these securities and explain the main reasons they issue these bonds. Describe the main forms of bonds issued by (non-financial) companies (excluding hybrids) and on the basis of evidence of the amounts issued assess the size of this segment of

My paper discusses how applied information management systems have a variety of risks and the different types of security you can get.

2007 words - 8 pages are embedded in a Web browser and saved on the user's hard drive" (57). Cookies enable information about the user's computer and location, which someone can use this information to invade one's privacy. Another way to invade one's privacy is by a "software that secretly gathers information about users while they browse the Web," also known as spyware. It has the to ability to take over other computers, where the hacker can alter the computer

Security Risk in Utility Management Workplace Security

1717 words - 7 pages reliability of the electric power infrastructure. Security needs to be considered in communications and systems architectures and standards; in products that are purchased; and in employee methods, procedures, and training. Additionally, industry should consider establishing an electronic incident reporting and clearing function for electronic intrusions, similar to what is already done for power outages and physical attacks." (Moulten)Works

Similar Essays

You Need To Present A List Of Pc Security Measures That Deal With Some Of These Other Possible Security Concerns. Give At Least Three Security Measures Of The Following Areas:

1093 words - 4 pages Question 2a Physical protection of PCs and network devices.Lock the room at which the PCs and network devices are placed when you are away or out of the room for any period of time. If the computer contains sensitive information, it must be kept in a locked area.Also, using cable locks is another solution. Laptop cable locks are similar to the locks used on bicycles. A steel clip provided by the manufacturer is installed on a security slot

Australia's Security Relationship With The United States Has Both Great Benefits And Great Risks.

686 words - 3 pages agreements, the rational behind this being that we are less likely to be attacked by nations we trade and communicate on an equal level with. Our government however is unwilling to consider this prevention strategy in the climate of fear terrorism has created. Since September 11, and more so with the bombings in Bali and Jakarta, Australia has become increasingly anxious about terrorist attacks on the western world. With this panic has come an

List And Define The 5 Components Of All Human Cultures. Why Do You Think They Are Found In All Cultures? Explain How These 5 Components Are Interrelated.

805 words - 3 pages social living. Beliefs are specific statements that people hold to be true. Norms are rules and expectations by which a society guides the behavior of its members. Technology is knowledge that people use to make a way of life in their surroundings, which is reflected by material culture.I think that all of these components are found in all cultures because humans are all from one single species. This reverts to Sociobiology, or ways in which human

Controls To Diminish Information Security Risks

2320 words - 9 pages guarantee that the low cost vendor is not undermining the work effort as a measure to diminish internal expenditures (Smith, 2002). Conclusion The research goal was to present a BI plan to the CIO in an effort to promote outsourcing and offshoring IS activities. Topics included (a) strategies for updating technical hardware, software, service, and knowledge used in the reduction of information security risks; (b) the role of launch and analytical