Essay on Current Attack Vectors And Secure Network Design

Essay on Current Attack Vectors And Secure Network Design

Length: 2065 words (5.9 double-spaced pages)

Rating: Better Essays

Open Document

Essay Preview

Current Attack Vectors and Secure Network Design
Windows is one of the most popular operating systems. It’s used in homes, corporations, and industrial facilities. Windows is compatible with almost every application. Windows also has a huge quantity of functions. On the other hand, Windows operating system requires a lot of computer resources (memory, processor, disk space), and thus, runs slower (Informatics-Tech, n.d.). “When talking about security it’s hard not to mention the many pitfalls of the Windows architecture (Stobing, 2014)”. “The Schannel vulnerability showed that even after thousands of security updates, new builds, and from-the-ground-up certification audits, the sheer magnitude of what Windows offers means it will always be a little bit further behind the curve than the rest (Stobing, 2014)”. So, the use of an antivirus program is necessary because Windows is the most susceptible to viruses and hackers. “Microsoft can’t clamp down on malware without restricting its relatively open stance towards applications — which, of course, is part of why Windows is so popular (Stobing, 2014)”. “Overall, Windows is the option if you’re looking to strike a balance between hardware capability and application availability, but it falls short in security (Stobing, 2014)”.
Macintosh is another popular operating system. It’s less susceptible to viruses and hackers than Windows. Macintosh is reliable due to the fact that it only runs on Apple computers, and are thus less prone to hardware and software crashing (Informatics-Tech, n.d.). On the other hand, Macintosh is more expensive than Windows, is only available on Apple computers, and it’s not as compatible with other programs and applications. “As the rate of adoption for...


... middle of paper ...


...fidential or proprietary information to a new employer (Toren, 2012). If suspicious activity on the part of the departing employee is uncovered, a full-scale investigation of the former employee’s recent conduct should be conducted (Toren, 2012).
The three most useful tools for a hacker to utilize are Nmap, Metasploit, and Wireshark. Nmap is a free open source tool that’s mainly used for network discovery and security auditing (“Hacker Tools”, n.d.). “Metasploit is a computer security project (framework) that provides the user with vital information regarding known security vulnerabilities and helps to formulate penetration testing and IDS testing plans, strategies and methodologies for exploitation (“Hacker Tools”, n.d.)”. “Wireshark captures data packets in a network in real time and then displays the data in human-readable format (verbose) (“Hacker Tools”, n.d.)”.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Good Design: The Eames Essay

- The study selected the Eames famous design to talk about the impact of the social. Firstly, I will introduce the Eames’ background. Secondly, I will introduce some of their futures. Thirdly, I will talk more about the Eames house. Finally, I will talk about what I had inspired from them. If good design is the collision of creativity, hard work and a bit of serendipity, then the Eames' design can proudly bear the title. Charles and Ray Eames are well-known for their assistance to furnishings and developed conceive, movies, exhibitions, playthings and architecture....   [tags: Design]

Better Essays
1917 words (5.5 pages)

Identifying Vulnerability And Risk Vectors For Internet Of Things Essay

- Introduction The purpose of this quantitative research study is to find a solution for identifying vulnerability and risk vectors for Internet of Things (IoT) and sensitive data processed and stored across billions of devices or things connected to Internet for enabling private and public transactions. Information Security vulnerabilities can be addressed by identifying threats from vulnerabilities, gaps in existing physical, technical controls and processes proactively and implementing the required mitigation controls....   [tags: Computer security, Security, Risk]

Better Essays
1229 words (3.5 pages)

Pathogens And Their Vectors : Infectious Diseases Essay

- Pathogens and their vectors can now move further, faster and in greater numbers than as documented in the past. Infectious diseases have been the major killers of humans. It is only within the last century that they have been replaced by chronic diseases and injuries as primary killers in the United States. Worldwide, infectious diseases still account for 25 percent of all deaths. The major advances in infectious disease control to date have been through protection of food and water and through immunizations....   [tags: Infectious disease, Epidemiology, Disease]

Better Essays
1076 words (3.1 pages)

Design And Design Of Interior Design Essay

- Interior design is one of the most important professions. When thinking of design and architecture industry, it is necessary to keep in mind that the professionals emphasis on matters of everyday life when commencing a project. Important sectors of interior design consist of: residential, commercial, hospitality, healthcare, education and corporate designs. Thus, the field deals with numerous factors and affects almost everyone in some way. Design is goal-oriented– it strives to achieve a certain purpose....   [tags: Design, Designer, Interior design]

Better Essays
748 words (2.1 pages)

Essay on Target: The Largest Data Breach/Attack

- In December 2013, Target was attacked by a cyber-attack due to a data breach. Target is a widely known retailer that has millions of consumers flocking every day to the retailer to partake in the stores wonders. The Target Data Breach is now known as the largest data breach/attack surpassing the TJX data breach in 2007. “The second-biggest attack struck TJX Companies, the parent company of TJMaxx and Marshall’s, which said in 2007 that about 45 million credit cards and debit cards had been compromised.” (Timberg, Yang, & Tsukayama, 2013) The data breach occurred to Target was a strong swift kick to the guts to not only the retailer/corporation, but to employees and consumers....   [tags: cyber attack, data breach, hackers]

Better Essays
1217 words (3.5 pages)

Designing Design Thinking Into The Workplace Essay

- “Design Thinking” in my workplace. Why Introduce Design Thinking. The question shouldn’t be “Why introduce Design Thinking into the workplace?” It should be “Why wouldn’t you introduce Design Thinking into the workplace?” Design thinking is another way to solve problems and can be described as another tool in your tool belt to be used in conjunction with other powerful methods, such as scientific analysis. Design Thinking uses an interdisciplinary approach that combines different methods and tools (Stickdorn & Schneider, 2012) to find solutions to customer problems....   [tags: Design, Design management, Idea, Design thinking]

Better Essays
1191 words (3.4 pages)

The Importance Of The Engineering Design Process Essay examples

- The engineering design processes role is to serve as the framework/guidelines that will aid the robotics designer in either improving a current robotics system or helping him/her design a new one. The engineering design process is a five step system that helps to develop a solution from infancy all the way through to implementation. The engineering design process does relates to the various system development processes in that it will be used to for the design of those systems (robotic legs, arms, sensors, joints, etc.) We can better understand this relationship by further expanding our knowledge of the correlation between the engineering design process and the robotic design process....   [tags: Design, Engineering, Engineering design process]

Better Essays
1065 words (3 pages)

Elements of Design Essay

- Elements of Design The elements of design were created by Arthur Wesley Dow to help people see, describe, and create visual qualities in a systematic way. It consists of 7 elements: line, shape, form, colour, value, texture and space. Lines are paths or marks left by moving points and they can be outlines or edges of shapes and forms. Lines have qualities which can help communicate ideas and feelings such as straight or curved, thick or thin, dark or light, and continuous or broken. Implied lines suggest motion or organize an artwork and they are not actually seen, but they are present in the way edges of shapes are lined up....   [tags: Design]

Better Essays
1621 words (4.6 pages)

Interaction Design Essay

- 1. AESTHETICS OF INTERACTION DESIGN As being a designer I always try to design something new, creative and interactive. Most of the people think that designers are born to modify and beautify things, which is totally wrong designers give directions of living; they transform the ugly into beautiful things. I have a deep interest in aesthetics and that I am tackling with the concept of aesthetics on a daily basis, in words as well as in drawings, movies, prototypes and other artifacts of interaction design....   [tags: Interaction Design Essays]

Better Essays
2644 words (7.6 pages)

Design Patterns Essay

- Design Patterns What is a Design Pattern. A design pattern solves a problem within a given context. The solution that is offered by implementing a pattern results in a system design structure, which balances the concerns of the design problem in a manner most appropriate for the given context. In “Understanding and Using Patterns in Software Development”, Dirk Riehle and Heinz Zullighaven offer a rather nice definition of what a design pattern is: “A pattern is the abstraction from a concrete form which keeps recurring in specific non-arbitrary contexts.” The ability to write good patterns is very difficult....   [tags: Definition Design Pattern]

Better Essays
1551 words (4.4 pages)