IT-FP3358_SlocumDean_Assessment4-1.docx - SECURING...

This preview shows page 1 - 3 out of 6 pages.

SECURING APPLICATIONS WITH VPN1Assessment 4: Securing Applications with VPNDean M. SlocumCapella University
SECURING APPLICATIONS WITH VPN2Threats and vulnerabilities to different OS.The Windows operating system, like all OS, can have threats and potentialvulnerabilities. One such threat is DoS (Denial of Service). There are two types of DoSvulnerabilities known as flood attacks and crash attacks. A flood attack occurs when a systemreceives too many requests. This will cause the system to slow down and eventually crash. Thistype of attack can include overflow, ICMP, and SYN attacks. DoS attacks act as distractionswhile a network infiltration or data theft occurs. A DoS can also be used as a DDoS on a largerscale that involves multiple compromised systems attempting to exploit a target from multipledirections simultaneously (Andress, 2014).Linux Kernel is typically thought of as a strong OS in terms of security due its open-source nature. However, if a vulnerable piece of hardware is in use on the same system, then thesystem can still become compromised. One example is Realtek wi-fi modules that can be used incertain Linux devices for establishing communication with the OS. This chip created avulnerability on the OS that allowed the entire system to be taken over by an attacker whilewithin radio range of a malicious device. The vulnerability is tracked as CVE-2019-17666(Andrews, 2018).Anti-malware solution for organization with OS.Anti-malware solutions will most commonly involve the use of third-party securitysoftware. Norton AntiVirus can be a large-scale security software suite that can aid in CapitalOne’s security arsenal. Norton software has been in use for nearly 30 years and has developed astrong reputation as a cyber security firm. Their software can be used on all major OS releasesincluding Windows, MacOS, and Linux. In relation to malware specifically, Norton utilizes AIand machine learning as the core of its software. Their package takes advantage of intrusion

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
NoProfessor

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture