[SOLVED] provide replies to discussion 10

I need support with this Computer Science question so I can learn better.

Struggling to find relevant content or pressed for time? – Don’t worry, we have a team of professionals to help you on
[SOLVED] provide replies to discussion 10
Get a 15% Discount on this Paper
Order Now

main que:What is active threat in terms of network security? Provide an example p

Note:No need to provide answer to main question.Read below posts and reply accordingly.

sru-

Active Threat:

The active threats are known to take initiatives to have a targeted compromise and agree to the demands. There are different types of active threats on network security like hacker, intruder or malicious automated worm. Any vulnerable system is an easy target for active threats. Any organization needs to have the best possible security deployed that avoids being discovered by active threats. Once the active threats find a weak point in the network system might lead to a risk of compromise. The targets depend on the business value a company has in the market (Stewart, 2014).

The active threats do not care about a single computer or a small network. If any company that takes care of hosting hundreds of systems or getting lots of traffic, would become the valuable target naturally (Stewart, 2014). A native firewall is one of the best security network saviors from active threats. A normal home user or small company can afford a simple and inexpensive firewall to obtain reasonable security protection from active threats.

Example:

Data breaches in many companies have been observed for the past many years. Companies lose lots of money and most importantly the sensitive data is exposed to unauthorized users which may result in loss of information or use of the information for all wrong reasons. Phishing attacks are one of the common attacks used to attack the network systems. Phishing emails are one of the sources to attack and have the compromise of the system. These emails contain several types of links to malicious software. If an employee clicks that link, that results in compromising the whole network system as the hackers will be ready to get the information. So, the employees need to look out for the suspicious email which contains threats, wrong spellings of the words etc.

NA-

Generally, threats fall into two main categories: passive and active. Now we are discussing about Active threat in terms of network security. An active threat is one that takes some type of initiative to seek out a target to compromise. These can be hackers, intruders, or automated worms. In any case, an active threat seeks out vulnerable targets. If we do not have reasonable security deployed and an active threat discovers our system, we might be at risk for a compromise. Fortunately, most individuals and small office environments are not significant or primary targets of most hacker activity. There just isn’t enough value or benefit in spending the time and effort to compromise a moderately secured single computer or small network. If business is getting lots of traffic and orders or you happen to be hosting hundreds of systems, then you naturally become a more valuable target to hackers.

In most circumstances, the average home user and most small offices (such as those operating a dozen or fewer computers in a network) can obtain reasonable security protection from very simple and inexpensive firewall options.

The first firewall option to consider is any native firewall of the operating system. Most OSs include a default or native firewall. If so, investigate its features and options before automatically tossing it aside. Many of the firewalls found in the latest releases of operating systems are as good as or better than most commercially available third-party host software firewall options from Shobha (2019, August 9).

An Active attack attempts to alter system resources or effect their operations. Active attack involves some modification of the data stream or creation of false statement.

Types of active attacks are as following:

  • Masquerade
  • Modification of messages
  • Repudiation
  • Replay
  • Denial of Service

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
Sign up, place your order, and leave the rest to our professional paper writers in less than 2 minutes.
step 1
Upload assignment instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
s
Get personalized services with MyCoursebay
One writer for all your papers
You can select one writer for all your papers. This option enhances the consistency in the quality of your assignments. Select your preferred writer from the list of writers who have handledf your previous assignments
Same paper from different writers
Are you ordering the same assignment for a friend? You can get the same paper from different writers. The goal is to produce 100% unique and original papers
Copy of sources used
Our homework writers will provide you with copies of sources used on your request. Just add the option when plaing your order
What our partners say about us
We appreciate every review and are always looking for ways to grow. See what other students think about our do my paper service.
Nursing
Thank you for the outstanding work .
Customer 452635, June 5th, 2022
Human Resources Management (HRM)
Thanks for the paper. Hopefully this one will receive higher than a C and has followed all guidelines.
Customer 452701, November 16th, 2022
Psychology
Thanks so very much. The paper is well-researched and adequately referenced. You have been of great help during the pandemic!
Customer 452467, January 31st, 2021
Other
great
Customer 452813, December 12th, 2024
Finance
Thank You
Customer 452643, October 24th, 2021
Nursing
Thank you!
Customer 452707, October 16th, 2022
Wellness
The skilled writer did a great job on assignment!! Thank you!!
Customer 452547, June 16th, 2021
Education
Thank you so much for your help so I do not go insane from trying to do this. I have 2 more courses to do. Probably will be using you again.
Customer 452675, November 28th, 2021
Other
Thanks for the help, appreciate it
Customer 452821, August 27th, 2022
Other
Excellent work, delivered ahead of schedule
Customer 452467, January 19th, 2024
Other
NICE
Customer 452813, June 25th, 2022
Application Letters
Well written essay, will definitely use this service in the future.
Customer 452773, April 14th, 2022
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information