Enhance and elaborate on the port scanning andor


QA. Local Area Network (LAN) Security

  • Discuss/describe one or more LAN based attacks (also known as layer 2 attacks or lower layer attacks) and share additional thoughts you may have on LAN based attacks
  1. Discuss the security measures or methods used to prevent or mitigate the LAN based attacks you presented in Question A.

QB.  Router Security

  • Discuss/describe two or more attacks to which routers (layer 3 devices) are vulnerable.
  1. How are these attacks detected and prevented by the security devices (e.g. Intrusion Detection Systems or firewalls)?

Please include insight citation when answering the questions and a minimum of 3 reference to each questions please reframe from plagiarism and a minimum of 250 word per question  for example question A  part 1 250 words part 2 250 words   question b part 1 250 words part b 250 words

QC. Port Scanning Enumeration.

  1. Discuss/describe the port scanning and/or enumeration techniques (attacks) . How can the attacks you have described be detected and prevented?
  2. Enhance and elaborate on the port scanning and/or enumeration techniques (attacks) Share any additional thoughts you may have on them and explain how they can be detected and/or prevented.

Readings

  • Murphy, S. L., & Badger, M. R. (1996, February). Digital signature protection of the OSPF routing protocol. Proceedings of the Symposium on Network and Distributed System Security (pp. 93-102). Retrieved from https://citeseerx.ist.psu.edu/viewdoc/download?.1.1.52.7830&&
  • Chomsiri, T. (2008, November). Sniffing packets on LAN without ARP spoofing. Proceedings of the International Conference on Convergence Information Technology (pp. 472-477). Retrieved from https://www.researchgate.net/publication/215766539_Sniffing_Packets_on_LAN_without_ARP_Spoofing/file/58caf610db9cf1f2958bcfa2cfe159ff.pdf
  • Abad, C. L., & Bonilla, R. (2007, June). An analysis on the schemes for detecting and preventing ARP cache poisoning attacks. Proceedings of the 27th International Conference on Distributed Computing Systems. Retrieved from https://www.researchgate.net/publication/4264370_An_Analysis_on_the_Schemes_for_Detecting_and_Preventing_ARP_Cache_Poisoning_Attacks/file/5046351656f0d82ce6.pdf
  • Goodrich, M., & Tamassia, R. (2010). Introduction to computer security. Boston, MA: Addison-Wesley [chapters 5.1, 5.2 & 5.3, pp. 222-244].

Optional Reading

  • Droms, R. (1999). Automated configuration of TCP/IP with DHCP. IEEE Internet Computing, 3(4), 45-53. [Available at: https://www.computer.org.ezproxy.umuc.edu/csdl/mags/ic/1999/04/w4045-abs.html - Note: this is a good tutorial paper on DHCP].

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: Enhance and elaborate on the port scanning andor
Reference No:- TGS01420662

Now Priced at $30 (50% Discount)

Recommended (90%)

Rated (4.3/5)