Windows Server 2008 and Internet Research Paper

Download this Research Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Research Paper:

This occurs when a server happens to receive more connection requests that are incomplete and that it cannot possibly handle. This kind of attack's source code were released in 2006 by 2600 and Phracks two well-known underground hacker magazines. The second threat is IP Spoofing which is an attack which involves the impersonation of a legitimate host user at the IP layer. The third one is sequence number attack. The third one is TCP session hijacking. The third threat is denial of service attacks Security strategies to address various threats that are addressed by IPSec that users who use unsecured TCP/IP face

In order to ensure that users of unsecured TCP/IP don't fall victims to the threats outlined above, the following strategies must be employed;

Countering SYN Flooding:

The ISPs that are responsible for the IP packets must block the non-internal addresses that are responsible for the flooding. The attacker would then be forced to use official IP source to send the packets which can be used to trace them (via server audit logs).The lack of anonymity would then deter the would-be attackers from launching the SYN Floods. The other one preventive measure is to use make changes to the network aspects of a given operating system and also the inclusion of intrusion detection tools (Rodgers, 2001).

Countering IP spoofing:

Changing of the routing tables of the routers and gateways of the spoofed routing tables by means of protocols such as BGP4,RIP (Rodgers, 2001).

Methods of configuring the IPSec securities policies

There are basically two methods. These are transport mode and tunnel mode They are described by Ferguson, Poulton and Barrett (2004) as follows:

Transport mode

IPSec can effectively be used in the transport mode in order to secure communication happening between two workstations that are ion the same network. The arrangement can either be a server-to-client or a server-to-server communication. Then IPSec gives an end-to-end surety on the basis of the encryption setting and the authentication that is applied (Ferguson, Poulton and Barrett, 2004).

Tunnel mode

IPSec is used in this mode so as to secure communication taking place between two separate networks (Ferguson, Poulton and Barrett,2004).

Encrypting File Services

The Encrypting File Services is a technology that is used to encrypt files in the file systems of various Operating Systems such as Windows 2000, Windows Server 2003, Windows Server 2008 and Windows XP (Microsoft, 2010).It names use symmetric and asymmetric key cryptography.

How Windows Server 2008 use public and private key encryption.

Windows Server 2008 uses public key encryption (an asymmetrical cryptography) through the use of keys that can be publicly transferred and then used in the encryption and decryption of the message. The private key is noted to be with the creator for the purpose of decrypting the message.

Private key encryption in Windows Server 2008 makes use of symmetric cryptography .A single key is used to encrypt as well as to decrypt a particular message. This therefore requires the sending of the key itself from the sender of the message to the receiver (Windows2008serveradmintools, 2008).

Conclusion

It is important that TCP/IP be effectively used in order to configure a given network since traditionally it has been considered to be an unsecure protocol. Other methods should therefore be employed in order to ensure that data integrity is assured.

References

CEEnet (2000)Applications of IPSec

http://www.ceenet.org/workshops/lectures2000/Richard_Perlman/ipsec/tsld002.htm

Ferguson, B Poulton, D and Barrett, D (2004). MCSA/MCSE 70-299 Exam Cram 2:

Implementing and Administering Security in a Windows 2003 Network

Essinger, J. 2001. Internet Trust and Security. England: Addison-Wesley.

Intelligentedu.com (2006). Computer Security for Everyone: Networking Security

http://www.intelligentedu.com/computer_security_for_everyone/13-networking-security.html

Microsoft (2010) Using Encrypting File System

http://technet.microsoft.com/en-us/library/bb457116.aspx

Rodgers, C (2001).Threats to TCP/IP Security

http://www.cosc.canterbury.ac.nz/research/RG/i-net_security/Threats_TCP_IP_Security.pdf

Sahai, a and Graupner, S (2005). Web services in the enterprise: concepts, standards, solutions, and management

Windows2008serveradmintools (2008).Windows 2008 Understanding Private / Public Key

Encryption: understand private/public key encryption.

http://windows2008serveradmintools.blogspot.com/2008/05/windows-2008-understanding-private.html[continue]

Some Sources Used in Document:

"Chapter-13:-Networking-Security" 

Cite This Research Paper:

"Windows Server 2008 And Internet" (2010, November 27) Retrieved December 2, 2016, from http://www.paperdue.com/essay/windows-server-2008-and-internet-6290

"Windows Server 2008 And Internet" 27 November 2010. Web.2 December. 2016. <http://www.paperdue.com/essay/windows-server-2008-and-internet-6290>

"Windows Server 2008 And Internet", 27 November 2010, Accessed.2 December. 2016, http://www.paperdue.com/essay/windows-server-2008-and-internet-6290

Other Documents Pertaining To This Topic

  • Windows Vista Overview of the

    This translates into the use of system cache as part of the memory allocation algorithms inherent in the VA memory space approach to managing memory in Vista. In addition, memory manager now relies on kernel page tables that are loaded at system initiation and allocated on demand. This saves a significant amount of system resources including a minimum of 1.5MB on Intel x86-based systems and up to 3MB on

  • Internet and Society 1976 Present

    Internet and Society The Internet and American Society In the history of humankind there have been very few inventions which have completely transformed human society. Inventions like the wheel, agriculture, astronomy and geometry have all transformed humankind from uncivilized barbarians into a creatures of culture and society. The invention of science, discovery of electricity, the atom, and other inventions have then propelled the human race forward into a more technologically society, one

  • Security Implementation of Microsoft Windows

    Window Security Implementation Scenario NextGard Technologies specializes in the network consulting services for small, medium and large organizations inside and outside the United States. Currently, NextGard has approximately 250,000 employees in 5 countries and the company corporate headquarter is located at Phoenix, AZ. However, the company decides to secure and upgrade its current network to enhance organization efficiencies. Currently, the company has 5 district offices at the following locations: New York City, New

  • Window 7 Ultimate Windows 7 Ultimate Is

    Window 7 Ultimate Windows 7 Ultimate is the powerful and most versatile edition of the Window 7. The Window 7 Ultimate combines the remarkable aspects and easy-to-use of the Window 7 Home Premium and Window 7 Professional. Typically, the Window 7 Ultimate is able to support the MUI (Multilingual User Interface) packages, UNIX application as well as the BitLocker Drive Encryption. More importantly, Window 7 Ultimate will assist a user to

  • Microsoft Windows File Systems Comparison and Contrast

    Microsoft Windows File Systems: Comparison and Contrast The standard versions of Windows use three types of file systems: FAT, exFAT, and NTFS. Windows 8 server also uses ReFS. The 8 server (Windows Server 2012) is the only version that uses that type of file system, as the other versions of Windows are not able to boot from that type of file system at all. In order to better understand these file

  • UNIX vs Windows Operating System

    The Windows operating system architecture also allows for single sign-on and also relies on user name and password verification. The authentication process for a Windows operating system at the server level can also be configured to validate the identity of the person logging in at the Windows domain and Microsoft Active Directory Service levels as well. Certificates can be assigned to specific applications, databases and processes within a Windows sever-based

  • Invention of the Internet Has

    This software is used to perform common tasks like storage, data back up and data transfers. Small and medium businesses have embraced this technology because it involves no start up costs (like servers, hard disks, technicians etc.) therefore making it cost effective. Basically payment is based on the storage space taken by the user, again, this makes it user friendly. It may also be referred to as hosted storage. The flying


Read Full Research Paper
Copyright 2016 . All Rights Reserved