Let's start a new assignment project together, Get Exclusive Free Assistance Now!

Need Help? Call Us :

Place Order

INFT2031 Systems And Network Administration

Mar 13,23

Question:

1. List six ways an attacker gains access to a network.
2. Your network is experiencing an excessive amount of pings to your network server. The pings are from outside the network. Someone suggests that you set an access list to block ICMP packets coming into the network. How would you respond?
3. Your supervisor informs you that a user on the network has requested a VPN connection. Prepare a response to the supervisor discussing what is needed to provide the connection.

Answer:

Introduction

6 ways attacker gains access to a network

Phishing

Phishing is a faux e-mail that is used by attackers. Cybercriminals create unsolicited mail emails to thieve touchy information in which they intend to steal your private information along with passwords and bank account information. This sort of electronic mail seems to be from a reputable person or agency along with your financial institution or the corporation you figure for. These emails often try and create urgency or panic to trick users into giving out their non-public data. For instance, you get hold of an e mail from your bank pronouncing that your ATM card has been closed and also you need to affirm your card wide variety or your Aadhaar range so one can restart it. The victim who obtained the e-mail may think it turned into from a legitimate source while the email was clearly despatched to a malicious crook who turned into seeking to steal your private statistics.

Malware

It is malicious software program that is programmed to compromise the system and to steal information from the system. These programs can perform a selection of tasks, some of which include stealing or deleting sensitive statistics, fixing system key features, and secretly monitoring the victim’s activities. There are various factors which can lead to the installation of malware to your device. Some use an older or out of date version of an dangerous or up to date operating device and for that reason turn out to be susceptible to assault. Clicking on unknown hyperlinks or installing faux / compromised software program may additionally bring about malicious download.

Malicious Mobile Apps

There is a huge false impression that each app to be had on Google Playstore or Apple store is secure and criminal. However, that isn’t the case. Not all apps available in those stores are secure for users. Some of these applications may incorporate malicious code that could endanger your privateness.

Smishing

Smishing is a form of phishing rip-off wherein someone attempts to trick you into giving them your personal facts via telephone name or SMS message. Smishing is turning into a developing and growing chance within the on-line security international.

Physical Security Threats

Physical risk is any risk for your sensitive facts from other people with direct bodily access for your gadgets consisting of laptops, tough drives and mobile gadgets. Physical threats are regularly underestimated inside the face of technological threats together with identification theft and malware. Mobile device threats arise whilst someone is able to bodily access your private information along with facts accrued on stolen devices. Physical security breaches can arise at your administrative center or in your home. For instance, a person might also discover your non-public documents that you must no longer see or access an unprotected comfortable gadget with a password.

Insecure Networks

Connecting your device or device to an unprotected community can create the opportunity for a hacker to benefit get admission to to all the files for your gadget and display your on-line activity. An net hacker who controls your device can steal the passwords of your social networking bills, financial institution money owed, and inject malicious software program into relied on web sites. With loose online services, every body can stay inside the automobile outdoor your property and get right of entry to your vital documents, accounting statistics, usernames and passwords, and another statistics on the network. A competitor with so much expertise of your legal files will be a dangerous or even deadly hazard in your business. Connecting to a free “airport” / WiFis coffee keep is mainly risky if you are appearing essential on line activities such as banking, private chat or even browsing your email. These networks are regularly left unprotected and may permit a malicious criminal in a store / district to effortlessly perceive them.

Response towards Blocked ICMP Packets

My network is experiencing an excessive amount of pings to your network server. The pings are from outside the network. Someone suggests me to set an access list to block ICMP packets coming into the network. In that case, I might say, it truly is a very good idea however some things that want to be constant earlier than you can positioned a listing of get entry to points in region. First, we can have to determine in which the access list could be positioned i.e. (which border direction) or the servers are hitting. And additional entry steps need to be taken as setting up get admission to to the actual firewall using package filtering.

Response to set up VPN Connection

To,

The Supervisor,

Subject: Response to set up VPN Connection

Hello Mr Supervisor XYZ,

I am here to discuss about the steps to be followed to set up VPN connection as requested by user. First off all Windows operating system is required to set up VPN connection. Generally the 4 steps are required to set up the VPN connection. I am discussing here by taking into consideration windows 10 operating system. Kindly follow the steps below:

Step 1: Have Proper Login Details

To set up a Windows 10 VPN connection, you want the proper login details. Otherwise you will no longer be capable of get admission to the VPN server. If your VPN connection is set up on your work, you may need to invite your manager for the ideal login data. Are you operating with a VPN for private use? Then create this information for your self whilst putting in your account. With this statistics, which usually consists of a username and password and a particular server cope with to which you may connect, you may comply with the three steps below to connect with a VPN. If you do now not have a VPN account and login information and need a very good VPN to guard your internet connection, you may continually strive CyberGhost. This provider could be very reasonably-priced, however still high first-class. In addition, they have got a 45-day cash back assure, which lets in you to strive the carrier first.

Step 2: Open VPN settings in Windows

Go to the start menu (by means of clicking on the Windows emblem inside the decrease left corner of your display screen) and then click Settings. This button typically looks like a small cogwheel wheel. When the ‘Settings’ display opens, click on Network and Internet from the menu. Then select a VPN from the list on the left side of the display. The image to the proper of this newsletter suggests what this looks like. You have now determined the VPN settings screen on Windows and are prepared to feature a VPN connection to your app.

Step 4: Connection to VPN Server

Yours Faithfully,

Network Administrator.

References

ET CONTRIBUTORS. (2017, October 30). Internet security 101: Six ways hackers can attack you and how to stay safe. The Economic Times; Economic Times. https://economictimes.indiatimes.com/tech/internet/internet-security-101-six-ways-hackers-can-attack-you-and-how-to-stay-safe/articleshow/61342742.cms

How to Set Up a VPN in 6 Steps. (n.d.). Cisco. Retrieved January 16, 2022, from https://www.cisco.com/c/en_in/solutions/small-business/resource-center/security/how-to-setup-a-vpn.html

Setting Up a VPN Connection on Windows 10 (Step-By-Step). (2020, April 2). VPNoverview.com. https://vpnoverview.com/vpn-setup/install-vpn-windows/

0 responses on "INFT2031 Systems And Network Administration"

Leave a Message

Your email address will not be published. Required fields are marked *