Windows Server 2008 And Internet Research Paper

Length: 5 pages Sources: 4 Subject: Education - Computers Type: Research Paper Paper: #9458016 Related Topics: Microsoft Windows, Flooding, Ip Address, Internet
Excerpt from Research Paper :

This occurs when a server happens to receive more connection requests that are incomplete and that it cannot possibly handle. This kind of attack's source code were released in 2006 by 2600 and Phracks two well-known underground hacker magazines. The second threat is IP Spoofing which is an attack which involves the impersonation of a legitimate host user at the IP layer. The third one is sequence number attack. The third one is TCP session hijacking. The third threat is denial of service attacks Security strategies to address various threats that are addressed by IPSec that users who use unsecured TCP/IP face

In order to ensure that users of unsecured TCP/IP don't fall victims to the threats outlined above, the following strategies must be employed;

Countering SYN Flooding:

The ISPs that are responsible for the IP packets must block the non-internal addresses that are responsible for the flooding. The attacker would then be forced to use official IP source to send the packets which can be used to trace them (via server audit logs).The lack of anonymity would then deter the would-be attackers from launching the SYN Floods. The other one preventive measure is to use make changes to the network aspects of a given operating system and also the inclusion of intrusion detection tools (Rodgers, 2001).

Countering IP spoofing:

Changing of the routing tables of the routers and gateways of the spoofed routing tables by means of protocols such as BGP4,RIP (Rodgers, 2001).

Methods of configuring the IPSec securities policies

There are basically two methods. These are transport mode and tunnel mode They are described by Ferguson, Poulton and Barrett (2004) as follows:

Transport mode

IPSec can effectively be used in the transport mode in order to secure communication happening between two workstations that are ion the same network. The arrangement can either be a server-to-client or a server-to-server communication. Then IPSec gives an end-to-end surety on the basis of the encryption setting and the authentication that is applied (Ferguson, Poulton and Barrett, 2004).

Tunnel mode

IPSec is used in this mode so as to secure communication taking place between two separate networks (Ferguson, Poulton and Barrett,2004).

Encrypting...

...

The private key is noted to be with the creator for the purpose of decrypting the message.

Private key encryption in Windows Server 2008 makes use of symmetric cryptography .A single key is used to encrypt as well as to decrypt a particular message. This therefore requires the sending of the key itself from the sender of the message to the receiver (Windows2008serveradmintools, 2008).

Conclusion

It is important that TCP/IP be effectively used in order to configure a given network since traditionally it has been considered to be an unsecure protocol. Other methods should therefore be employed in order to ensure that data integrity is assured.

References

CEEnet (2000)Applications of IPSec

http://www.ceenet.org/workshops/lectures2000/Richard_Perlman/ipsec/tsld002.htm

Ferguson, B Poulton, D and Barrett, D (2004). MCSA/MCSE 70-299 Exam Cram 2:

Implementing and Administering Security in a Windows 2003 Network

Essinger, J. 2001. Internet Trust and Security. England: Addison-Wesley.

Intelligentedu.com (2006). Computer Security for Everyone: Networking Security

http://www.intelligentedu.com/computer_security_for_everyone/13-networking-security.html

Microsoft (2010) Using Encrypting File System

http://technet.microsoft.com/en-us/library/bb457116.aspx

Rodgers, C (2001).Threats to TCP/IP Security

http://www.cosc.canterbury.ac.nz/research/RG/i-net_security/Threats_TCP_IP_Security.pdf

Sahai, a and Graupner, S (2005). Web services in the enterprise: concepts, standards, solutions, and management

Windows2008serveradmintools (2008).Windows 2008 Understanding Private / Public Key

Encryption: understand private/public key encryption.

http://windows2008serveradmintools.blogspot.com/2008/05/windows-2008-understanding-private.html

Sources Used in Documents:

References

CEEnet (2000)Applications of IPSec

http://www.ceenet.org/workshops/lectures2000/Richard_Perlman/ipsec/tsld002.htm

Ferguson, B Poulton, D and Barrett, D (2004). MCSA/MCSE 70-299 Exam Cram 2:

Implementing and Administering Security in a Windows 2003 Network
http://www.intelligentedu.com/computer_security_for_everyone/13-networking-security.html
http://technet.microsoft.com/en-us/library/bb457116.aspx
http://www.cosc.canterbury.ac.nz/research/RG/i-net_security/Threats_TCP_IP_Security.pdf
http://windows2008serveradmintools.blogspot.com/2008/05/windows-2008-understanding-private.html


Cite this Document:

"Windows Server 2008 And Internet" (2010, November 27) Retrieved December 4, 2021, from
https://www.paperdue.com/essay/windows-server-2008-and-internet-6290

"Windows Server 2008 And Internet" 27 November 2010. Web.4 December. 2021. <
https://www.paperdue.com/essay/windows-server-2008-and-internet-6290>

"Windows Server 2008 And Internet", 27 November 2010, Accessed.4 December. 2021,
https://www.paperdue.com/essay/windows-server-2008-and-internet-6290

Related Documents
Deployment and Administration Windows Server 2012
Words: 2567 Length: 8 Pages Topic: Computer Science Paper #: 44281663

Deployment and Administration - Windows Server 2012 Deployment and Server Additions The number of servers required the roles to be combined. Server Requirements: Careful evaluation of present and projected activity considerations helps decide the server configuration. The number of servers required will correspond directly to the amount of functional data handling for the next three to five years. If a growth of 33% is projected, then it would be prudent to use a RAM

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Pages Topic: Education - Computers Paper #: 20437974

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Windows Vista Overview of the
Words: 3044 Length: 10 Pages Topic: Education - Computers Paper #: 2768371

This translates into the use of system cache as part of the memory allocation algorithms inherent in the VA memory space approach to managing memory in Vista. In addition, memory manager now relies on kernel page tables that are loaded at system initiation and allocated on demand. This saves a significant amount of system resources including a minimum of 1.5MB on Intel x86-based systems and up to 3MB on

Internet and Society 1976 Present
Words: 2665 Length: 8 Pages Topic: Education - Computers Paper #: 58716736

Internet and Society The Internet and American Society In the history of humankind there have been very few inventions which have completely transformed human society. Inventions like the wheel, agriculture, astronomy and geometry have all transformed humankind from uncivilized barbarians into a creatures of culture and society. The invention of science, discovery of electricity, the atom, and other inventions have then propelled the human race forward into a more technologically society, one

Kris Corporations Servers and Networking
Words: 3513 Length: 16 Pages Topic: Information Technology Paper #: 72276822

Kris Corporation's parent domain (kris.local) and child domain (corp.kris.local) for the organization's AD infrastructure are running on Server 2008. The following are concerns related to AD: (1) Kris Corporation is concerned about running multiple domains, and (2) automobile manufacturers are asking Kris Corporation to use a single identity to procure orders in real time. The company has five locations in Atlanta (GA), Baltimore (MD), Chicago (IL), Seattle (WA) and San

Window 7 Ultimate Windows 7 Ultimate Is
Words: 1618 Length: 6 Pages Topic: Education - Computers Paper #: 29373259

Window 7 Ultimate Windows 7 Ultimate is the powerful and most versatile edition of the Window 7. The Window 7 Ultimate combines the remarkable aspects and easy-to-use of the Window 7 Home Premium and Window 7 Professional. Typically, the Window 7 Ultimate is able to support the MUI (Multilingual User Interface) packages, UNIX application as well as the BitLocker Drive Encryption. More importantly, Window 7 Ultimate will assist a user to