Uploaded by yohithas321

prepostseo-1665697177

advertisement
PLAGIARISM SCAN REPORT
Date
October 13, 2022
Exclude URL:
NO
Unique Content
98%
Word Count
Plagiarized Content
2%
Records Found
Paraphrased Plagiarism
0
914
1
CONTENT CHECKED FOR PLAGIARISM:
Security misconfiguration
Security misconfigurations occur when security measures are incorrectly configured or left
unattended, putting systems and data at risk. Any configuration change with a subpar explanation,
a default setting, or a technical problem with
Main types of securityany endpoint component could lead to a misconfigurationi.
As an organization, the security of the network and data is the main concern so in the next section
the
description of the incorrect configuration of a Firewall and Third-party VPN will be explained the
impact on the organization. The typical questions for many people are:
a) What is a Firewall and what this is doing?
b) What are a VPN and a third-party VPN?
a) Firewall- a piece of software or hardware with the scope of filtering the traffic between the
Internet and networks and so between computer to the computer any organization. For work
properly in good parameters, a firewall can protect the network or computers of the organization
must be installed d c figured The jobs of the firewall in an organization can install and
configure is to protect the system, resources, files, and data from viruses, hacks, I ng and any type
of
security attacked.
For an organization, the impact of a Firewall is incorrect installation and configuration that the
network is
exposing any kind of attack with the consequences of losing: Files, Data, Confidential data, Staff
time,
Reputation.
I next section is present the threat and vulnerability with the description of the incorrect firewall
configuration
of an organization.[ CITATION Bri031 \l 2057 ]
Threats and vulnerability Description
DDoS Attack Distributed Denial of Services (DDoS) attacks are used by attackers with a
highly effective and low cost to execute. This attack is used to spread malicious
software, infected emails, and attachments with the scope to infect the system
or computer lulled Banana et. Once t stem computer is infected e
a ckers can control the botnet commanding it to flood a site with traffic.
SQL injection attack It is a language in which the attacker sends a code injection into all vulnerable
servers that use SQL with the scope of rerevealingnformation from the server.
Table 1 Firewall Threats and Vulnerability
Figure 7 Networks with Firewall
Vasile-Daniel Alupoae Security
As an organization, the security of the network and data is the main concern so in the next section
the
description of the incorrect configuration of a Firewall and Third-party VPN will be explained as the
impact on the organization.Internet and network and also between computer to computer in any o
nization.must be installed d configured. The jobs of the firewall in an organization once install and
configure is to protect the system, resources, files, and data from viruses, hacking, ng and any
type of
security attacked.
For an organization, the impact of a Firewall is incorrect installation configuration e is that the
network is
highly effective and low-cost to execute.software, infected emails, and attachments with DMZ
will be placed inside the firewall and for th
b) System Failures - Depends on the devices and systems used for example if it is used an old
system or computers the probability of failure is more likely compared with high-quality
equipment that the failure is minimize
c) Accidental human interference - no matter the business accidentally everyone by
mistake can delete important files or click on maliNetwork security involves preventing
unauthorized access, misuse, and theft of the underlying networking infrastructure. For users,
applications, devices, and users to collaborate securely, a secure infrastructure must be builti.
A static IP address is an unchanged number
configured manually for a device like a
computer or a router or one that was assigned
by A DHCP server. To configure any devices
with a static IP that might be done through the
a device as a router giving out IP addresses or
manually, as a computer or laptop typing the
The IP address for the device itself
A static IP address is an unchanged number
The IP address for the device itself
Backup policy
MATCHED SOURCES:
www.docsity.com - 2% SimilarCompare
https://www.docsity.com/en/p1-identify-types-of-security-ris....
Report Generated on October 13, 2022 by prepostseo.com
Download