Network Monitoring Network Activity According Essay

PAGES
2
WORDS
536
Cite

The responses to a network security monitoring attack needs to be based on an assessment of the method of the attack that is being leveled against the network and its security monitoring, and thus can be as varied and complex as the attacks themselves (Bejtlich, 2004). Two tactics or tools that an attacker might use to attack network security monitoring are an attack from a stepping stone or an attacking using a spoofed source address. Both of these are methods by which the attacker uses tools and processes to hide their location and identity, making it more difficult to trace the origin of the malicious activity and thus to end it and also causing problems when it comes to the legal end of proving and prosecuting crimes. There are numerous methods of addressing attacks that...

...

An attack might also focus on the client rather than the server, attempting to move through the server as ordinary traffic and only become recognizable as malicious further into the network. Addressing this type of attack must involve some method of tracking the malicious activity forward rather than backwards, and again there are multiple ways to accomplish this (Bejtlich, 2004).

Sources Used in Documents:

References

Bjetlich, R. (2004). The Tao of Network Security Monitoring: Beyond Intrusion

Detection. New York: Pearson.


Cite this Document:

"Network Monitoring Network Activity According" (2012, June 14) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/network-monitoring-network-activity-according-59953

"Network Monitoring Network Activity According" 14 June 2012. Web.24 April. 2024. <
https://www.paperdue.com/essay/network-monitoring-network-activity-according-59953>

"Network Monitoring Network Activity According", 14 June 2012, Accessed.24 April. 2024,
https://www.paperdue.com/essay/network-monitoring-network-activity-according-59953

Related Documents
Network Design Proposal
PAGES 15 WORDS 4024

Network Design Proposal Network Requirements ABC School Stats/User Counts Having a current strength of approximately 845 students, ABC School provides education from Pre-Kindergarten to the 12th Grade. According to the requirements of The New York School District, 250 Curriculum computers along with 75 Administration computers are to be installed. The requirements for the wiring per room of layer 1 are that it should adjust a total of 25 computers, 24 of which will

Credit Risk Management Banks are an important part of the economy of any nation. Traditionally, the banks operate as financial intermediaries serving to satisfy the demand of people in need of various forms of financing. Through this, banks enable people to purchase home and businesses to expand. These financial institutions therefore facilitate investment and spending that are responsible for fueling the growth of the economy. In spite of their vital role

Attack Causality in Internet-Connected Cellular Networks," internet infrastructure security researchers Patrick Traynor, Patrick McDaniel and Thomas La Porta address the convergence of telecommunication and internet networks, and "how the architecture of cellular networks makes these systems susceptible to denial of service attacks" (2007). Rather than attribute the threat posed by denial of service attacks to the oft cited cause of limited bandwidth capability, the authors contend that telecommunication and

Network Security
PAGES 25 WORDS 9364

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere

Similarly, this type of non-invasive acoustic and vibrational monitoring has been used by doctors to get a better assessment of in vivo hip conditions so that they can better comprehend things like total hip arthroplasty (Glaser et al., 2010). Acoustic Signals "Acoustic emissions are elastic waves generated by a rapid release of energy at a localized source. They are produced by events such as particle impact, gas evolution, boiling, phase transitions,

The subject matter of systems administration includes computer systems and the ways people use them in an organization. This entails knowledge of operating systems and applications, as well as hardware and software troubleshooting, but also knowledge of the purposes for which people in the organization use the computers. The most important skill for a system administrator is problem solving. The systems administrator is on call when a computer system goes