Network Security Threats, Mitigation Techniques, and Protocols

This assignment solution discusses network security threats, mitigation strategies, and key security protocols.

Benjamin Fisher
Contributor
4.3
51
5 months ago
Preview (2 of 6 Pages)
100%
Purchase to unlock

Page 1

Network Security Threats, Mitigation Techniques, and Protocols - Page 1 preview image

Loading page image...

NetworkSecurityThreats,MitigationTechniques,andProtocolsQ1.Whichdoyouthinkisagreatersecuritythreatintheweb,Serversideexecutablesorclientsideexecutablesandwhy?Ans.Clientsideexecutablesaregreaterthreatascomparestoserversideexecutablesasanyonecanaccessanywebsitefromanycorneroftheworldandthecanuploadanythingdangeroustoanyonewebsiteeveniftheyareblockedbythatwebsitepermanentlyeventhenthecanusevariousproxyservermethodstoaccessthatwebsite.Fromclientsidetheycanuploadanythingwhichisnotappropriateforourserverandalsotheycanalsotakeinformationfromourserverrelatedtootherpersonandusetheirinformationfortheirbenefits.Alsoifserverisconfiguredonceitistoughtoreconfigureitagainbutifclientscriptorexecutablesarecaughtonceandthenblockedthenanewonecanbegeneratedveryeasilybutifanyvulnerabilityisfoundoutinserverittooktimetoreconfigureit.Q2.WhatistheprimarysecurityvulnerabilityofFTPandwhatisthebestwaytomitigateit?Ans.BasicallywhyweuseFTP:i.Tosharefileii.Toincreaseuseofremotecomputingiii.Tosharedataefficientlyandreliablyiv.ToprotectuserfromvariationindifferentfilestoragesystemamonghostsThesearethemainmotivewhyFTPisusedbutItdonotincludesecuritythatswhyitisbeenexploitedagainandagain.AsweknowFTPisusedtosharefilefromoneremotesystemtootherorwecansayfromanonymouslocation.SotherecanbedifferenttypeofsecuritythreatstoFTP:Readaccess:Itenablesanonymouspeopletoreadandaccesstofilesyouwantedtobepublicandinkeepingthempublicisnorisk.Theprimarysecuritythreatsare:1.Misconfiguration:Makingfileavailableevenifitisnotintendedtobepublic.2.Vulnerability:TheremustbesomevulnerabilityinIIScodewhichcanbeusedbysomeonetoattack.Writeaccess.EnablinganonymouspersontowriteanythingoursystemviaFTPisthegreatestsecuritythreat.Ifanycanuploadanythingonoursiteorinoursystemandanyoneaccessitthenitwillbemuchbigproblemasanyonecanuploadanyvirusormayanything

Page 2

Network Security Threats, Mitigation Techniques, and Protocols - Page 2 preview image

Loading page image...

Preview Mode

This document has 6 pages. Sign in to access the full document!

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all