IT390 Unit 4 Topic 2

docx

School

Purdue Global University *

*We aren’t endorsed by this school

Course

390

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

1

Uploaded by MinisterElementWolverine34

Report
IT390 Unit 4 Topic 2: An additional layer of protection that supplements firewalls, antivirus programs, and network- based intrusion prevention systems (NIPS) is called a host-based intrusion prevention system (HIPS). Attacks that other security layers were unable to detect, see, or halt are stopped by HIPS. The five stages to an internet attack are: 1) Probe 2) Penetrate 3) Persist 4) Propagate 5) Paralyze Probe: Probing entails looking for weaknesses in the network as the first step. Sweeping probes, or network or port scans, require a properly set firewall to be protected against. Highly automated probes are the equivalent of intelligence collection for hackers. What software is installed on your network? What software vulnerabilities do you have? Which is the simplest method to join your network? Typical probing tools include ping addresses and methodical guesses about passwords and mail users. Paralyze: Permanent harm is caused at the paralysis stage. Users face widespread denial of service (DoS), computers break, and the system becomes rife with security flaws. Data can also be altered, deleted, or transferred to an attacker. The best defense is a well-managed network, continuously monitored and shielded by several security layers. References Secureworks. (2011, June 28). HIPS Are Crucial When Hackers Sidestep Your Firewall . IF HACKERS SIDESTEP YOUR FRONT DOOR, WHO’S WATCHING YOUR BACK? https://www.secureworks.com/blog/why-hips
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help