IT283__Unit_10_Assignment.docx Unit 10 Assignment IT283 Purdue University Global Part 1: 1.According to the textbook “Guide to TCP/IPâ€, profiling IP networks allows potential attackers to identify potentia
...
IT283__Unit_10_Assignment.docx Unit 10 Assignment IT283 Purdue University Global Part 1: 1.According to the textbook “Guide to TCP/IPâ€, profiling IP networks allows potential attackers to identify potential targets for attacks. Ways to protect a network from profiling is to maintain the system and keep it up-to-date with the latest patches to prevent attackers from taking advantage of bugs in the system. Since profiling is a process to identify potential security weaknesses, simple training and network monitoring could go a long way in trying to preventing attacks occurring from the result of profiling. (Tittel et al. 2012) 2.When it comes to the weaknesses of TCP/IP, the textbook “Guide to TCP/IPâ€, mentions a few weaknesses, starting with model it was based off, an optimistic security model, could be the root cause. Ways attackers could exploit a TCP/IP are through things such as user impersonation, session hijacking, or IP spoofing. User impersonation is a method used by hackers, where they impersonate valid users of well-known accounts and try to guess passwords. A successful attempt in stealing a username and password results in user impersonation, using the account to exploit the rights and privileges of the account. This method could be avoided if users change their frequently and use hard to guess passwords instead of recycling easily guessed ones. Session Hijacking is method that involves an attacker taking over an existing communications session by inserting IP packets that shi. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Show More]