Saturday, October 5, 2019
Network Security Questions Assignment Example | Topics and Well Written Essays - 500 words
Network Security Questions - Assignment Example Botnets mainly send harmful mails in form of spam campaign messages to the target points of the attackers. The botnet can therefore spread as viruses, Trojans or worms through emails and websites. The objectives of botnet attack are to enable the attackers spy on the victims and gain access to sensitive information such as financial statements. They steal the victimsââ¬â¢ credentials and hijack banking information, ultimately leading to stealing of money. Their transactions run concurrently with those of their victims. The attackers can also use botnet to access the system source codes. Botnet attackers can use their victimsââ¬â¢ computers and resources for sending malicious spam. These can then spy other victimââ¬â¢s and execute denial of service command against them. The victims spend a lot of money as well as time to recover from the consequences. Worse still, botnet attacks can land victims into legal challenges. It is not easy for the victim to realize from the onset that the sender of the malware is in fact a fellow victim. In that case, the end victim may take sue the supposed attackers. On the other hand, Proxy firewalls are intermediate barriers that accept every traffic instructions moving into a network. It achieves this through impersonation of the actual receiving point of the traffic in the network. From the results of inspection, it grants or denies access and the proxy firewall relays feedback to the destination. After the destination replies, proxy firewall ends the connection. Only one of the two computers remains connected to the global network. ACLS are not capable of reading past packet headers. This gives only basic details concerning the network. In this regard, ACLs packet filtering is not sufficient in itself to eliminate network threats. Proxy firewall demands that every application require a separate proxy at the level of each application. Proxy firewall network suffer
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.