Verified Document

Windows Server 2008 And Internet Research Paper

This occurs when a server happens to receive more connection requests that are incomplete and that it cannot possibly handle. This kind of attack's source code were released in 2006 by 2600 and Phracks two well-known underground hacker magazines. The second threat is IP Spoofing which is an attack which involves the impersonation of a legitimate host user at the IP layer. The third one is sequence number attack. The third one is TCP session hijacking. The third threat is denial of service attacks Security strategies to address various threats that are addressed by IPSec that users who use unsecured TCP/IP face In order to ensure that users of unsecured TCP/IP don't fall victims to the threats outlined above, the following strategies must be employed;

Countering SYN Flooding:

The ISPs that are responsible for the IP packets must block the non-internal addresses that are responsible for the flooding. The attacker would then be forced to use official IP source to send the packets which can be used to trace them (via server audit logs).The lack of anonymity would then deter the would-be attackers from launching the SYN Floods. The other one preventive measure is to use make changes to the network aspects of a given operating system and also the inclusion of intrusion detection tools (Rodgers, 2001).

Countering IP spoofing:

Changing of the routing tables of the routers and gateways of the spoofed routing tables by means of protocols such as BGP4,RIP (Rodgers, 2001).

Methods of configuring the IPSec securities policies

There are basically two methods. These are transport mode and tunnel mode They are described by Ferguson, Poulton and Barrett (2004) as follows:

Transport mode

IPSec can effectively be used in the transport mode in order to secure communication happening between two workstations that are ion the same network. The arrangement can either be a server-to-client or a server-to-server communication. Then IPSec gives an end-to-end surety on the basis of the encryption setting and the authentication that is applied (Ferguson, Poulton and Barrett, 2004).

Tunnel mode

IPSec is used in this mode so as to secure communication taking place between two separate networks (Ferguson, Poulton and Barrett,2004).

Encrypting File Services

The Encrypting File Services is a technology that is used...

The private key is noted to be with the creator for the purpose of decrypting the message.
Private key encryption in Windows Server 2008 makes use of symmetric cryptography .A single key is used to encrypt as well as to decrypt a particular message. This therefore requires the sending of the key itself from the sender of the message to the receiver (Windows2008serveradmintools, 2008).

Conclusion

It is important that TCP/IP be effectively used in order to configure a given network since traditionally it has been considered to be an unsecure protocol. Other methods should therefore be employed in order to ensure that data integrity is assured.

References

CEEnet (2000)Applications of IPSec

http://www.ceenet.org/workshops/lectures2000/Richard_Perlman/ipsec/tsld002.htm

Ferguson, B Poulton, D and Barrett, D (2004). MCSA/MCSE 70-299 Exam Cram 2:

Implementing and Administering Security in a Windows 2003 Network

Essinger, J. 2001. Internet Trust and Security. England: Addison-Wesley.

Intelligentedu.com (2006). Computer Security for Everyone: Networking Security

http://www.intelligentedu.com/computer_security_for_everyone/13-networking-security.html

Microsoft (2010) Using Encrypting File System

http://technet.microsoft.com/en-us/library/bb457116.aspx

Rodgers, C (2001).Threats to TCP/IP Security

http://www.cosc.canterbury.ac.nz/research/RG/i-net_security/Threats_TCP_IP_Security.pdf

Sahai, a and Graupner, S (2005). Web services in the enterprise: concepts, standards, solutions, and management

Windows2008serveradmintools (2008).Windows 2008 Understanding Private / Public Key

Encryption: understand private/public key encryption.

http://windows2008serveradmintools.blogspot.com/2008/05/windows-2008-understanding-private.html

Sources used in this document:
References

CEEnet (2000)Applications of IPSec

http://www.ceenet.org/workshops/lectures2000/Richard_Perlman/ipsec/tsld002.htm

Ferguson, B Poulton, D and Barrett, D (2004). MCSA/MCSE 70-299 Exam Cram 2:

Implementing and Administering Security in a Windows 2003 Network
http://www.intelligentedu.com/computer_security_for_everyone/13-networking-security.html
http://technet.microsoft.com/en-us/library/bb457116.aspx
http://www.cosc.canterbury.ac.nz/research/RG/i-net_security/Threats_TCP_IP_Security.pdf
http://windows2008serveradmintools.blogspot.com/2008/05/windows-2008-understanding-private.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Windows Vista Overview of the
Words: 3044 Length: 10 Document Type: Term Paper

This translates into the use of system cache as part of the memory allocation algorithms inherent in the VA memory space approach to managing memory in Vista. In addition, memory manager now relies on kernel page tables that are loaded at system initiation and allocated on demand. This saves a significant amount of system resources including a minimum of 1.5MB on Intel x86-based systems and up to 3MB on

Internet and Society 1976 Present
Words: 2665 Length: 8 Document Type: Research Paper

Internet and Society The Internet and American Society In the history of humankind there have been very few inventions which have completely transformed human society. Inventions like the wheel, agriculture, astronomy and geometry have all transformed humankind from uncivilized barbarians into a creatures of culture and society. The invention of science, discovery of electricity, the atom, and other inventions have then propelled the human race forward into a more technologically society, one

Window 7 Ultimate Windows 7 Ultimate Is
Words: 1618 Length: 6 Document Type: Essay

Window 7 Ultimate Windows 7 Ultimate is the powerful and most versatile edition of the Window 7. The Window 7 Ultimate combines the remarkable aspects and easy-to-use of the Window 7 Home Premium and Window 7 Professional. Typically, the Window 7 Ultimate is able to support the MUI (Multilingual User Interface) packages, UNIX application as well as the BitLocker Drive Encryption. More importantly, Window 7 Ultimate will assist a user to

Microsoft Windows File Systems: Comparison and Contrast
Words: 1164 Length: 3 Document Type: Essay

Microsoft Windows File Systems: Comparison and Contrast The standard versions of Windows use three types of file systems: FAT, exFAT, and NTFS. Windows 8 server also uses ReFS. The 8 server (Windows Server 2012) is the only version that uses that type of file system, as the other versions of Windows are not able to boot from that type of file system at all. In order to better understand these file

UNIX Vs. Windows Operating System
Words: 2430 Length: 6 Document Type: Research Paper

The Windows operating system architecture also allows for single sign-on and also relies on user name and password verification. The authentication process for a Windows operating system at the server level can also be configured to validate the identity of the person logging in at the Windows domain and Microsoft Active Directory Service levels as well. Certificates can be assigned to specific applications, databases and processes within a Windows sever-based

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now