Find Jobs
Hire Freelancers

Academic Writing - response tcp security

$10-30 USD

완료함
게시됨 7년 이상 전

$10-30 USD

제출할때 지불됩니다
short response to these two statements: 1. TCP-IP Security One of the more interesting TCP-IP vulnerabilities is its ability to guarantee the location of where a packet is coming from. RIP is an essential component of a TCP/IP network. RIP is the Routing Information Protocol which is used to distribute routing information within networks, such as shortest-paths, and advertising routes out from the local network, (CHAMBERS, DOLSKE, & IYER, n.d.). The flaw in RIP is that it doesn’t have built in authentication much like TCP/IP. This attack is significant because RIP attacks change where the data may go to unlike common attacks that change where data has come from. When an attacker is able to compromise RIP addresses and send them from anywhere in the world this poses a huge security flaw. Attackers can forge RIP packets claiming that they are another host and they have the fastest route or path out of the network. This is troubling as there is a higher level DDOS attack that uses the RIPv1 protocol called Reflection Amplification Attacks. (Mimoso, 2015) says, “Reflection attacks happen when an attacker forges its victim’s IP addresses in order to establish the victim’s systems as the source of requests sent to a massive number of machines.” Because the attacker is in control of the RIP it can send many requests on behalf of a network. The recipients of the request issue an overwhelming flood of responses back to the victim’s network thus crashing that network, (Mimoso, 2015). I chose this vulnerability because it’s very current in the landscape of DDOS attacks and Threat post by Kapersky Labs suggest that this is only going to grow into the coming years. The easiest way to stop this is to use routers with RIPv2 and above. Unfortunately, a large number of the routers that have been compromised using this deprecated technology comes from AT&T and BellSouth and they are regularly distributed in the United States. 2, Cross site scripting (XSS) is a common web application injection vulnerability. Cross site scripting is used to impersonate users and bypass access controls. Hackers inject malicious code on the client side web applications to gather data from users. Hyperlink is usually the method used to gather the information that contains malicious content within it (Incapsula). To make it look less suspicious to the user, the hacker will encode the malicious part of the link in HEX. XSS differs from other web attacks such as SQL injection, in that it does not directly target the application itself. Instead risk is to the web application users. By hijacking a logged in users session, the hacker can change the password and if the administrators session is hacked, the hacker will have full admin privileges of that web application (Netsparker). After collecting data from the web application, the malicious code sends a results page to the hacker but in a manner that appears legitimate to the user. Attackers often inject ActiveX, HTML, Flash, JavaScript or VBScript into vulnerable applications. This form of attack can best be detected by using a web application firewall (WAF). Although WAF's use various methods to counter attacks, most use signature based filtering in blocking and recognizing attacks to and from HTTP web applications. Websites using SSL (https) encryption are no more safe than sites not encrypted. The attacks would work in the same manner except its taking place in an encrypted connection. Unlike network firewalls, with customization, WAF can prevent XSS, SQL injection, session jacking and buffer overflows by inspecting every HTML, HTTPS, SOAP and XML-RPC data packet (cgisecurity). Websites using SSL (https) encryption are no more safe than sites not encrypted. The attacks would work in the same manner except its taking place in an encrypted connection. APA FORMAT and use of resources
프로젝트 ID: 11982949

프로젝트 정보

7 제안서
원격근무 프로젝트
활동 중 7년 전

돈을 좀 벌 생각이십니까?

프리랜서 입찰의 이점

예산 및 기간 설정
작업 결과에 대한 급여 수급
제안의 개요를 자세히 쓰세요
무료로 프로젝트에 신청하고 입찰할 수 있습니다
프로젝트를 수여된 사용자:
사용자 아바타
I am well versed in content and academic writing. I have a unique skills in research and all the appropriate formatting styles/methods. My freelancing approach is to put the interests of all my clients first with an aim of developing a good rapport, while at the same time putting the value invested in me through efficient output.
$30 USD 1일에
4.8 (763 건의 리뷰)
7.5
7.5
7 이 프로젝트에 프리랜서들의 평균 입찰은 $42 USD입니다.
사용자 아바타
Hello, how are you? I hope you have a bright day/evening from your side. I have read the details provided, but please contact me so that we can discuss more on the project. I believe I have the required skills in this case. I will work on your requirements personally since I do not outsource to third parties, this guarantees you high-quality work that is delivered on time. You can also request for revisions till you’re fully satisfied with the work. I believe writing is a passion and not a money making business where people will deliver low-quality work just to get paid. Try my services, and you will never regret. Waiting for your kind response
$34 USD 1일에
4.7 (141 건의 리뷰)
6.6
6.6
사용자 아바타
Hi, I am an experienced academic writer of science and business subjects who has written numerous academic writing pieces on a wide variety of subjects. I have a high command of the English language, and I am capable of researching and writing on any topic. I have done business, marketing, economics, management, finance and a wide range of social sciences subjects. I will provide you plagiarism free, well researched, and quality work. I have written a lot of academic papers, research papers, reports, essays, thesis and dissertations. I am looking forward to your reply as soon, thanks. Regards, Sadia Maha
$25 USD 1일에
0.0 (0 건의 리뷰)
0.0
0.0

고객에 대한 정보

국기 (UNITED STATES)
Silver Spring, United States
5.0
51
결제 수단 확인
12월 4, 2011부터 회원입니다

고객 확인

감사합니다! 무료 크레딧을 신청할 수 있는 링크를 이메일로 보내드렸습니다.
이메일을 보내는 동안 문제가 발생했습니다. 다시 시도해 주세요.
등록 사용자 전체 등록 건수(일자리)
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
미리 보기 화면을 준비 중...
위치 정보 관련 접근권이 허용되었습니다.
고객님의 로그인 세션이 만료되어, 자동으로 로그아웃 처리가 되었습니다. 다시 로그인하여 주십시오.