Research Paper #1 Guidelines Topic Chosen: ATTACKS ON INFORMATION SECURITY Posted on: Wednesday, February 8, 2017 2:13:44 PM CST Choose your topic from Chapters 1-3 as it relates to Administration of...

1 answer below »

Research Paper #1 Guidelines

Topic Chosen: ATTACKS ON INFORMATION SECURITY

Posted on: Wednesday, February 8, 2017 2:13:44 PM CST



  • Choose your topic from Chapters 1-3 as it relates to
    Administration of Network and Information Security Standards. Research that topic in more depth by either using the internet or library. You should have at least 4 different sources for reference. The textbook should be your first point of reference.



      1. Describe the problem;

      2. Discuss previous work in the field and any necessary background information

      3. Explain what you did, how you did it, and what obstacles you encountered; or Provide specific findings of fact that support your proposed solution or thesis;

      4. List the resulting benefits, both quantitative and qualitative; and

      5. If applicable, provide an appendix giving the particulars of any models used or data collected during the research.





  • Research papers cannot contain errors of spelling, grammar, or punctuation. Proofread carefully.

  • All research papers must use APA citation.

  • All research papers must be submitted in Microsoft Word format, with a .doc or .docx suffix. No other formats are acceptable.

  • All research papers must include a number of sources, including printed and internet sources. Number of sources and ratio of print/internet sources are detailed below.

  • Students may use Wikipedia to help choose a topic, or to find possible sources for further research. However, Wikipedia may not be included as a reference in the bibliography.

  • Research papers should include images appropriate to the paper's content.

  • All research papers will be evaluated for length by word count (1,000 to 1,400), rather than pages, to account for differences in fonts, margins, pictures, etc. In Microsoft Word, you can check your work count by selecting Tools>Word Count.

  • All papers must be submitted electronically. Save your finished paper as "research_astudent.docx", only use your first initial and last name, rather than "astudent".

  • Plagiarism will not be tolerated, please review the university's policy on academic dishonesty.

  • No more than 33% of your paper can be cited material. You can't just string together a bunch of quotes to make a paper.



Answered Same DayDec 29, 2021

Answer To: Research Paper #1 Guidelines Topic Chosen: ATTACKS ON INFORMATION SECURITY Posted on: Wednesday,...

Robert answered on Dec 29 2021
125 Votes
Student name
Date
Topic: Attack on Information Security
Problem: Hackers theft content or files by attacking on the system
Information Security is very essential for every organization and if security is not managed
properly then it may suffer the
whole network system of organization. The design of network
system is designed or managed in such a way that it will not harm the organization system.
Type of threats that may attack the system:
Wi-fishing: This threat enters the system by different ways just like safe point. This threat is
so scaring because access to computer system gets halt. The major risk is computer or
network files get corrupted. An information security policy to prevent this threat is to install
latest antivirus software and avoid download infected file.
A Worm is similar to virus software whose main aim is to multiply itself on the network.
This is very dangerous as compared to Trojan viruses or other type of virus and wide spread
on network through email attachment etc. (Goodchild 2009)
Background Information
Now days, there are different types of Virus/Trojans/Worms/Spyware over the network
which may halt the whole system and the performance of network also halt. These attacks
have impacts which can get the data from the system and then send it across the system.
Attackers can then gather the data and use in the way they want to use it. Only way to protect
the system from attacks are by designing proper network design or system infrastructure.
Threats present on the network may slow down the network system and build permanent
connection with your system. Their aim is to start sending the files available on the system to
some other system over the internet, after uploading the files to the server, and then hackers
can use the data for unauthentic purpose.
Proposed solution: Proper design of network infrastructure
Different Attacks on system and solution
The various ways of taking control of network is Trojan horse programs, Back door and
remote administration programs, denial of service, being an intermediary for another attack,
Unprotected Windows shares, Cross-site scripting, Email spoofing, Email spoofing, Email-
borne viruses, Hidden file extensions, Chat clients, Packet sniffing, Mobile code (Java,
JavaScript, and ActiveX) etc . (Grimes 2002)
IP spoofing - IP spoofing is the act of using one machine to impersonate another. Many
applications and tools in UNIX systems rely on source IP address authentication. It involves
forging one's source IP address. (Bhavin Bharat Bhansali, 2001)
ARP spoofing - ARP spoofing involves forging packet...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here