QA. Local Area Network (LAN) Security
- Discuss/describe one or more LAN based attacks (also known as layer 2 attacks or lower layer attacks) and share additional thoughts you may have on LAN based attacks
- Discuss the security measures or methods used to prevent or mitigate the LAN based attacks you presented in Question A.
QB. Router Security
- Discuss/describe two or more attacks to which routers (layer 3 devices) are vulnerable.
- How are these attacks detected and prevented by the security devices (e.g. Intrusion Detection Systems or firewalls)?
Please include insight citation when answering the questions and a minimum of 3 reference to each questions please reframe from plagiarism and a minimum of 250 word per question for example question A part 1 250 words part 2 250 words question b part 1 250 words part b 250 words
QC. Port Scanning Enumeration.
- Discuss/describe the port scanning and/or enumeration techniques (attacks) . How can the attacks you have described be detected and prevented?
- Enhance and elaborate on the port scanning and/or enumeration techniques (attacks) Share any additional thoughts you may have on them and explain how they can be detected and/or prevented.
Readings
- Murphy, S. L., & Badger, M. R. (1996, February). Digital signature protection of the OSPF routing protocol. Proceedings of the Symposium on Network and Distributed System Security (pp. 93-102). Retrieved from https://citeseerx.ist.psu.edu/viewdoc/download?.1.1.52.7830&&
- Chomsiri, T. (2008, November). Sniffing packets on LAN without ARP spoofing. Proceedings of the International Conference on Convergence Information Technology (pp. 472-477). Retrieved from https://www.researchgate.net/publication/215766539_Sniffing_Packets_on_LAN_without_ARP_Spoofing/file/58caf610db9cf1f2958bcfa2cfe159ff.pdf
- Abad, C. L., & Bonilla, R. (2007, June). An analysis on the schemes for detecting and preventing ARP cache poisoning attacks. Proceedings of the 27th International Conference on Distributed Computing Systems. Retrieved from https://www.researchgate.net/publication/4264370_An_Analysis_on_the_Schemes_for_Detecting_and_Preventing_ARP_Cache_Poisoning_Attacks/file/5046351656f0d82ce6.pdf
- Goodrich, M., & Tamassia, R. (2010). Introduction to computer security. Boston, MA: Addison-Wesley [chapters 5.1, 5.2 & 5.3, pp. 222-244].
Optional Reading
- Droms, R. (1999). Automated configuration of TCP/IP with DHCP. IEEE Internet Computing, 3(4), 45-53. [Available at: https://www.computer.org.ezproxy.umuc.edu/csdl/mags/ic/1999/04/w4045-abs.html - Note: this is a good tutorial paper on DHCP].