Sign In
Not register? Register Now!
Pages:
6 pages/β‰ˆ1650 words
Sources:
4 Sources
Style:
MLA
Subject:
Communications & Media
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 26.73
Topic:

TCP/IP and its vulnerabilities. Techniques of attacks

Essay Instructions:

It must address a technical audience
must be done in proper English
must include real world examples
no less that 1500 words
12 size font

FINAL PAPER CHECK LIST:
Paper must be in MLA style form. Here is a guide: http://owl(dot)english(dot)purdue(dot)edu/owl/resource/747/01/
Please use legitimate sources. Wikipedia is not consider a reliable source. Use books, articles, and academic white papers.
The final paper should be no less than 1500 words, double space and 12 size font.
Include a Work Cited page.
Include heading with name, instructor name, course, and date.
Final submission needs to be done via the assignments link under
"Final Paper". No emails, they will not be consider for grading.
Required
I want to list some of the things that the paper should address:
It must address a technical audience. Think of our book the format and how it addresses you the reader.
This is not a Literature or English course; however, the paper must be done using proper English and grammar. Please use the appropriate Academic/Formal writing style.
The paper must include real-world examples. Using such examples explain the technical knowledge behind the subject. For example if it is a security breach. What were the flaws? How did the intruder discover such flaws? What was the financial cost for the organization? What do you recommend to protect from future attacks?
You must have at least 4 different sources.• The paper must be done using the MLA style form. Please do not forget to include a conclusion and a work cited page.
This final paper summarizes the overall knowledge acquired in this course. It gives you the opportunity to put in practice your technical skills as a security analyst. Furthermore, from here you have developed a new talent towards the implementation of a secure IT environment whether is at work or home.

Essay Sample Content Preview:
Name:
Professor’s Name:
Course:
Due Date:
TCP/IP AND ITS VULNERABILITIES
Introduction
The acronyms TCP refers to Transmission Control Protocol and IP refers to Internet Protocol. Internet protocol deals directly with the routing packets of data across computers or routers. However, the TCP ensures the delivery of data packets through a reliable channel across computers. There exists various vulnerabilities or rather design weakness as far as the security and privacy of the TCP/IP is concerned. In essence, some of these vulnerabilities relate to protocol design whereas the remaining attributable to software defects responsible for implementing the protocols. The different protocol weaknesses could be attributable to either the design of the protocol or the configuration, deployment as well as the daily operation of the DNS servers. Basically all the major Operating systems (OS) have utilized improvements especially in their implementation of what is referred to as the protocol stack that helps in mitigating different attacks. However, there have been different nature of enhancements of the TCP/IP that have been developed where several involve intensive use of encryption that requires the use of more computing power (Acharya et al., 69).
Techniques of attacks
There are several techniques associated with the arsenal of the TCP/IP attacker. However, successful attacks appear as a combination of some basic techniques which include: sniffing, buffer overflow, spoofing, poisoning, illegal packets, fingerprinting a system, storms, denial of service, and distributed denial of service. In this case, sniffing refers to the eavesdropping on the network whereby, sniffing defines the action by a certain machine on making copies of a network packet as sent by another different machine. The problem is possibly triggered by the near-universal choice of Ethernet which is a broadcast media and appears as the physical as well as data link layers. Sniffing is applicable in the monitoring of the health of various networks including capturing the existing passwords applicable in the telnet as well as FTP connections. The nature of the equipment applicable to the LAN facilitates sniffer capabilities. This is since the sniffer requires running on either the victim machine having the traffic of interest or another host machine within the subnet same as the victim. In this way, the NIC is capable of capturing the frames that specifically resembles its own MAC address. The nature of the volume of such frames presents a real challenge for the attacker to perform any processing.
Buffer overflow is a class of programming errors that occur in the TCP/IP server programs. The majority of such server programs operate under the privileges of a superuser. Some of the servers that serve as victims of such bugs include FTP servers, bind which is a ubiquitous DNS server program, send mail server and the Web server. Then spoofing attack refers to the aspect of altering packets for the purposes of rendering these packets structurally legitimate but in real sense the information it contains is not authentic. Such spoofed packets are always injected into the network. Poisoning refers to the ill-definition of the messages that provide information updat...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These MLA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!