Sample essay on network activity

Saturday, April 11, 2015.

Information security is important because it helps prevent unauthorized access or use and affects all organizations, including those affected by medium-sized enterprises. Information systems could not be underestimated and should therefore be protected at all times in order to preserve their resilience and credibility, regardless of the problems they faced

The electronic document protection system should be used in conjunction with new technologies to ensure that important information about the customer is not leaked from the business information systems. As a guide, we need to create open channels to inform and strengthen management support systems that can improve the overall security of our medium-sized business. The creation of communication tools can help reduce fraud and abuse of computer infrastructure, which will increase the return on business investment (Wright, Freedman & Liu, 2008, p. 3). With the help of electronic document protection, we will be able to control the confidentiality of information sent to customers or third parties (Smallwood, 2012, p. 10).

The absence of such technologies will cost our enterprise through various illegal means, as well as the loss of potential and ready investors. Like the management of our middle business in the middle business, we need to introduce mechanisms and document protection systems to prevent data loss and leakage of confidential information for our competitors. At the same time, we will not only protect our company against the dangers and high potential costs of cyber crimes, but also increase our credibility with our clients and partners

Examples of malware may include malicious spam, scanners, worms, and backsloping. Scanners are malicious online activities that come from a single source and usually target the same port on different computers or even at different ports on one computer on the network. They generate overflows of Internet packages and can also be differentiated by checking the size of a package on the Internet to show whether or not the package is rejected. In addition, the scanners can also be distinguished by observing the sources and recipients of the packages.  While ordinary Internet operations have different source and destination addresses, malicious and suspicious activity on the Internet can share the addresses of sources and destinations

The signature-based approach is also used to differentiate these actions by comparing the threat signatures to observable events, and this helps to identify specific differences. The malware of the network can be clearly identified because it typically occurs from the web site servers when trying to get out of the network through the installed firewalls. These network activities have been infiltrated through a firewall and placed on the servers of the website, and can leave the web site servers in the nature or in the form of malicious acts. Compared to normal activities, malicious or suspicious flows of operations are significantly lower

Traynor, McDaniel and La Porte identified two new Denial of Service (DoS) threats in cell service for data. They use procedures to install and destroy the communication channel in the various networks that implement the Common Radio Communications Service (GPRS), using an average low traffic volume. The first loophole is an attack of logical channels, not an unstructured theoretical bandwidth, which leads to a decrease in the volume of traffic required for denial of service (Trayor, McDaniel, & La Porta, (n.d), p. 311). Thus, attack types deplead resources and prevent access to the service temporarily and can be achieved by sending multiple text messages to a specific network sector to ensure that the timers (TBF) are out of date, which will result in a network failure from the consolidation of its logical resources

The second loophole or vulnerability arises from the inefficiency of access to the protocols on cellular data networks and the Internet. A Denial of Service (DoS) vulnerability arises because of similarities in the network processing flow, where uniform treatment of all flows regardless of size or duration indicates the lack of flexibility of the cellular network. Any minor changes in the conditions of the system can make it vulnerable to such attacks and because of its hard design, subsystems implement assumptions that correspond to one subset of traffic js on each other traffic. For example, an attack might occur if such assumptions cause the system to automatically enhance one incoming packet to a number of expensive latency operations. Similarly, changes to the system conditions might cause commands to fail on the system. This ultimately makes the system susceptible to attacks and breakdowns

By sharing information between foreign and home base stations, you can authenticate or verify information about any additional features that have been allocated, such as special data services (King, 1995, p. 109). Base or corruption stations simulate legitimate base stations to confuse subscribers who attempt to access services (Burmester, 2006, p. 83). Surfing involves receiving large documents from computer programmers without permission from the author, and usually happens when one of them uses such illegal means as hacking to access information from other programmers

It is, however, considered legitimate if it is used for the general good of the public. An example of this is the interception of communications from terrorist groups that plan to attack innocent people or even assist in tracing stolen goods. In general, GSM security objectives are to improve privacy and anonymity on the radio. It is also aimed at preventing fraud by establishing reliable identification codes, and its ultimate goal is to prevent the threat of security among competitors with bad intentions. SMS is a platform on which users can exchange encrypted and digitally signed messages. In this case, public key cryptography is typically used to provide communications between private parties

Burmeter, M., Yasinac, A., & International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADES 2005. (2006).

King, G.A. (1995).

Smallwood, R. F. (2012).

Tryor, P., McDaniel, P., & La Porta, T. (n.d) In the attack on a cellular network connected to the Internet.

Wright, C., Freedman, B., & Liu, D. (2008).

What you can read next