Five phases required to compromise a target of evaluation5
Reconnaissance6
Scanning6
Gaining Access6
Maintaining Access7
Covering Tracks Page7
The critical evaluation of the UK data protection Act13
Advantages and Disadvantages of the of using a specific technique15
Cost Efficient15
Unlimited Storage15
Recovery and Backup15
Rapid Deployment16
Technical Issues17
Cloud Security17
Prone to Attack17
Conclusion18
Abstract
There is always a question emerge that is the network secured and the information protected? Do we have some sort of powerful vulnerability that could be helpful in compromising with an attacker effectively on our system? Now in this revolutionized era of high technology, such questions have been become an essential component of questioning by a security officer every day. How can a person be sure about the security of his or her network? A modem is installed anonymously that opens up a backdoor and responds to the calls of the cooperate network without someone's knowledge. Ethical hacking and attacking is an evaluation regarding the testing and checking of a technology oriented environment for probable fragile vulnerabilities and links. The act of hacking illustrates the process of attacking an overall network by hacking some passwords, username, or other hidden information (Chapple, 2012, pp. 86). This assignment will focus on the security networks or on the networks for security purposes against some ethical hackers and attackers who used several kinds of methodologies and tools for hack and cause some damages to an entire system of network.
Security Networks
Introduction
Network security comprises of the laws and policies implemented by a administrator of network in order to monitor and prevent unauthorized misuse, access, denial, or modification of a network system of computer and other accessible resources of network. Security of networks consists of the authorized accessing to data in a system of network which is under controlled by the administrator of network. Users are assigned and chosen an ID with password or some other type of authentic information that permits them to access programs and information within their reserved rights to use that. The security of networks covers up a wide variety of networks of computer which are of both private and public type and are utilized in the jobs and tasks of everyday in order to conduct communications and transactions among several government agencies, businesses, and individuals. Such secured networks may be private as they work within the premises of a particular company, and some may be unlock and open to access of everyone publicly. Network security is implicated in the enterprises, organizations, and many other kinds of institutions. Its works as it's is shown exactly from its title that it protects and secures a network. Not only secures but also oversees and saves from any harm to the operations which are being executed (Marcel, 2009, p. 240). The most general and the simplest way to protect and secure a network are to assign that network with a matchless and unique name and also an analogous password.
The security of network begins with the authentication of the user, particularly with an ID along with ...