[SOLVED] provide replies to discussion 10
I need support with this Computer Science question so I can learn better.
main que:What is active threat in terms of network security? Provide an example p
Note:No need to provide answer to main question.Read below posts and reply accordingly.
The active threats are known to take initiatives to have a targeted compromise and agree to the demands. There are different types of active threats on network security like hacker, intruder or malicious automated worm. Any vulnerable system is an easy target for active threats. Any organization needs to have the best possible security deployed that avoids being discovered by active threats. Once the active threats find a weak point in the network system might lead to a risk of compromise. The targets depend on the business value a company has in the market (Stewart, 2014).
The active threats do not care about a single computer or a small network. If any company that takes care of hosting hundreds of systems or getting lots of traffic, would become the valuable target naturally (Stewart, 2014). A native firewall is one of the best security network saviors from active threats. A normal home user or small company can afford a simple and inexpensive firewall to obtain reasonable security protection from active threats.
Data breaches in many companies have been observed for the past many years. Companies lose lots of money and most importantly the sensitive data is exposed to unauthorized users which may result in loss of information or use of the information for all wrong reasons. Phishing attacks are one of the common attacks used to attack the network systems. Phishing emails are one of the sources to attack and have the compromise of the system. These emails contain several types of links to malicious software. If an employee clicks that link, that results in compromising the whole network system as the hackers will be ready to get the information. So, the employees need to look out for the suspicious email which contains threats, wrong spellings of the words etc.
Generally, threats fall into two main categories: passive and active. Now we are discussing about Active threat in terms of network security. An active threat is one that takes some type of initiative to seek out a target to compromise. These can be hackers, intruders, or automated worms. In any case, an active threat seeks out vulnerable targets. If we do not have reasonable security deployed and an active threat discovers our system, we might be at risk for a compromise. Fortunately, most individuals and small office environments are not significant or primary targets of most hacker activity. There just isn’t enough value or benefit in spending the time and effort to compromise a moderately secured single computer or small network. If business is getting lots of traffic and orders or you happen to be hosting hundreds of systems, then you naturally become a more valuable target to hackers.
In most circumstances, the average home user and most small offices (such as those operating a dozen or fewer computers in a network) can obtain reasonable security protection from very simple and inexpensive firewall options.
The first firewall option to consider is any native firewall of the operating system. Most OSs include a default or native firewall. If so, investigate its features and options before automatically tossing it aside. Many of the firewalls found in the latest releases of operating systems are as good as or better than most commercially available third-party host software firewall options from Shobha (2019, August 9).
An Active attack attempts to alter system resources or effect their operations. Active attack involves some modification of the data stream or creation of false statement.
Types of active attacks are as following:
- Modification of messages
- Denial of Service