ITM 820 Study Guide - Final Guide: Virtual Dos Machine, Proxy Server, Stateful Firewall

435 views13 pages

Document Summary

Avoid unsecure devices or technology (i. e. bluetooth) If going wireless, best option currently available is 802. 11i. Firewall 1: to test your network, implement honeypots. Network attacks: dos/ddos attacks dos attacks are easier to deal with, a distributed dos attack is designed to deplo(cid:455) o(cid:374)e or (cid:373)ore (cid:448)i(cid:272)ti(cid:373) (cid:373)a(cid:272)hi(cid:374)es (cid:272)alled (cid:858))a(cid:373)(cid:271)ies(cid:859). The atta(cid:272)kers ofte(cid:374) (cid:449)rite s(cid:373)all progra(cid:373)s that create a patch in an authorized code: synflood attacks are widely used against dns servers. The victim is continuously sent syn messages to designated ip address (i. e. 256 cmd prompts, on 100 zombies = 25,600 machines). A sand box creates a virtual environment for executing mobile code, if considered safe, it will be executed locally (otherwise it will be rejected: there are 5 types of protective controls: Type 1) (cid:862)dire(cid:272)ti(cid:448)e co(cid:374)trol(cid:863) is i(cid:374)te(cid:374)ded to ad(cid:448)ise e(cid:373)ployees of the behaviour expected from the often-called (cid:862)ad(cid:373)i(cid:374)istrati(cid:448)e (cid:272)o(cid:374)trols(cid:863)

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers