This website uses cookies to ensure you have the best experience. Learn more

This Essay Is About Secruity Risk List Four Possible Security Risks That The Bank And The Clients Are Facing In The Present Network Setup. Explain Clearly Why These Security Risks Exist.

1481 words - 6 pages

Question 1a. List four (4) possible security risks that the bank and the clients are facing in the present network setup. Explain clearly why these security risks exist.There are 4 possible security risks that the bank and the clients are facing in the present network setup.Firstly, there may be a possible security risk of interception occurs. Interception means that unauthorized party gain access to an asset. Because client send their transaction data which contains personal and sensitive data to the bank's Web server through the Internet. Without any security measures to protect the data, these data will easily been accessed by somebody.Secondly, there will be modification of data occurs in the present network setup. Modification means the unauthorized party gain access to an asset and tampers with the asset. In the present network setup, there is no security measure to ensure that unauthorized party cannot gain access to the data and tempers with the data. For example, unauthorized party may access to the transaction data and modify the content. Modification of data would occur between the communication of the client and the bank's web server and the bank's internal network.Thirdly, there may be a possibility of Denial of service occurs. A denial of service attack is used by an individual to destroy, shutdown, or degrade a computer or network resource. The goal of such attacks is to flood the communication ports and memory buffers of the targeted site to prevent the receipt of legitimate messages and the service of legitimate requests for connections. A denial of service attack might be used to bring down a server that a hacker wants to spoof. For example, a hacker may attempt to spoof the bank in order to obtain PINs or credit card numbers.Finally, there may be a potential risk of Masquerade occur. Masquerade means that n intruder pretends to be a legitimate user. Many other types of attack are built on masquerade as the first stage. Masquerade can use both technological and non-technological means. For example, somebody can learn the other's passwords by observing passing traffic on a LAN, called sniffing. Using a computer to exhaustively guess passwords until the correct one is found, called password cracking.b. List three (3) security measures that are needed to protect the bank's internal network. Explain clearly why these security measures are needed and in what ways they can give protection.Firstly, the bank should use router and firewall to protect the bank's internal network. Requests must filter through a router and firewall before they are permitted to reach the server. A router, a piece of hardware, works in conjunction with the firewall, a piece of software, to block and direct traffic coming to the server. The configuration begins by disallowing all traffic and then opens holes only when necessary to process acceptable data requests, such as retrieving web pages or sending customer requests to the bank. Firewall can limit the...

Find Another Essay On This essay is about secruity risk List four possible security risks that the bank and the clients are facing in the present network setup. Explain clearly why these security risks exist.

Australia's security relationship with the United States has both great benefits and great risks

686 words - 3 pages agreements, the rational behind this being that we are less likely to be attacked by nations we trade and communicate on an equal level with. Our government however is unwilling to consider this prevention strategy in the climate of fear terrorism has created. Since September 11, and more so with the bombings in Bali and Jakarta, Australia has become increasingly anxious about terrorist attacks on the western world. With this panic has come an

Pyramid of Links: This is a C&D Essay about Friends and the different categories of relationships that exist

936 words - 4 pages I always wonder why some people can make more friends than others. Communication skill is one important factor in making friends, but it doesn't mean that we treat all our friends in a same approach. Some friends are closer than others, and some are only good to have fun with. We all have different characteristics, and some people always like to have a lot of friends around; in contrast, I am the kind of person who would like to spend more time

All about Network Security

873 words - 4 pages situations but other times these emails can contain spywares or viruses attached. Protection against Network threats There are a number of ways to protect the network from security threats. It requires certain hardware and software for a network security system to be effective and there should always be a backup so that if one security system fails to work the backup would start providing protection. In this way, your network would not become vulnerable

"Afghanistan" This essay is about the history of events that has happened in Afghanistan, and about the past to present leaders

1200 words - 5 pages -American slogans in front of the United States embassy. President Daoud ordered the arrest of seven top PDPA leaders. The PDPA Central committee member Hafizullah Amin was placed under house arrest shortly. He planed a coup d'etat. PDPA leaders were liberated from a government prison. The plan for the April coup, according to Amin in a press conference that it had occurred two years ahead of the PDPA's schedule for revolution.Taraki, Amin, and

Controls to Diminish Information Security Risks

2320 words - 9 pages guarantee that the low cost vendor is not undermining the work effort as a measure to diminish internal expenditures (Smith, 2002). Conclusion The research goal was to present a BI plan to the CIO in an effort to promote outsourcing and offshoring IS activities. Topics included (a) strategies for updating technical hardware, software, service, and knowledge used in the reduction of information security risks; (b) the role of launch and analytical

What Is Network Security

631 words - 3 pages . Unprotected network shares are network shares with very little to no security and sometimes are made so that the members of this network can access them from their home. This can give a hacker a very easy way to get in. Social engineering involves manipulating members into giving security information. This is sometimes seen when a hacker deceives a member of a network into thinking that he or she is an authority and requires their account information

This paper talks about the types of glaciers, why glaciers are dangerous, where glaciers exist and much more!

1352 words - 5 pages GLACIERS!In many of the world's high mountains, the heat of the summer is not enough to melt all the snow that falls in winter. Whenever this occurs year after year, there is a gradual accumulation of snow in the upper ends of mountain valleys. These areas where the snow lasts from year to year are known as snowfields. In the sunny days of summer the surface of a snowfield melts, and the water, sinking into the snow, freezes beneath the surface

Explain how mortgage backed securities are issued. Present evidence of the main issuers of these securities and explain the main reasons they issue these bonds

948 words - 4 pages Present evidence of the growth in the importance of non-government bond issues over the past five years (to2005). Explain how mortgage backed securities are issued. Present evidence of the main issuers of these securities and explain the main reasons they issue these bonds. Describe the main forms of bonds issued by (non-financial) companies (excluding hybrids) and on the basis of evidence of the amounts issued assess the size of this segment of

Network Security

1567 words - 6 pages example, network security is used to protect the money you have at your bank. More and more things are being tracked on computers, it's essential to understand how to protect it from getting into the wrong hands. Who are we protecting ourselves from? It's an unfortunate thing to think about but we are protecting ourselves from ourselves. Although it seems like this is all new, we have always protected ourselves in one way or another

Network Security

1286 words - 5 pages Network Security Network security is a problem that network administrators face. It is something that network administrators should keep a careful eye on. For example, if the home network does not have any security measures in place, then the person is at a high risk of data loss due to hacking. Network security is something that businesses do not take very lightly because they want to protect their valuable information and network

Network Security

2198 words - 9 pages this may seem quite minor, it is not. Do you really want strangers to know all of the huge purchases you've made of booze and cigarettes? Do you want people to know you're a boozing smokestack? What about your credit bureau? Boy, if your credit bureau gets mixed up, that could keep you from getting a house. It could keep you from a lot of things. Your dreams could fade away, all because of fraud. Quite clearly, network security in today's

Similar Essays

Security Risks Essay

1552 words - 7 pages extra security from firewalls and things along those lines. Even home wireless routers offer some protection. When we are on the road, our mobile devices do not have that extra layer of security. This lack of added security causes our mobile devices to be easier targets. A common method to gathering user data is to setup a false Wi-Fi hotspot. For example, a person interested in gathering information can go to a place that offers free Wi-Fi, like a

The Risks That International Works Present To The United Arabic Emirates (Uae) Nationwide Security

2267 words - 10 pages This thesis will deal with the risk that international workers presents to UAE nationwide security. Moreover, this thesis will talk about the problems of the government due to of immigration employees and the need for UAE to recommend techniques for dealing with these problems and risks while reducing the effect on UAE citizens and their way of life. Also this article will display the features offered to immigrants by UAE government enhancing to

You Need To Present A List Of Pc Security Measures That Deal With Some Of These Other Possible Security Concerns. Give At Least Three Security Measures Of The Following Areas:

1093 words - 4 pages Question 2a Physical protection of PCs and network devices.Lock the room at which the PCs and network devices are placed when you are away or out of the room for any period of time. If the computer contains sensitive information, it must be kept in a locked area.Also, using cable locks is another solution. Laptop cable locks are similar to the locks used on bicycles. A steel clip provided by the manufacturer is installed on a security slot

List And Define The 5 Components Of All Human Cultures. Why Do You Think They Are Found In All Cultures? Explain How These 5 Components Are Interrelated

805 words - 3 pages social living. Beliefs are specific statements that people hold to be true. Norms are rules and expectations by which a society guides the behavior of its members. Technology is knowledge that people use to make a way of life in their surroundings, which is reflected by material culture.I think that all of these components are found in all cultures because humans are all from one single species. This reverts to Sociobiology, or ways in which human