session hijacking attacks

You know of the weaknesses in your organization’s network and information system. Now you will determine various known threats to the organization’s network architecture and IT assets.

Get acquainted with the following types of threats and attack techniques. Which are a risk to your organization?

  • IP addressspoofing/cache poisoning attacks
  • denial of service attacks (DoS)
  • packet analysis/sniffing
  • session hijacking attacks
  • distributed denial of service attacks

In identifying the different threats, complete the following tasks:

  1. Identify the potential hacking actors of these threat attacks on vulnerabilities in networks and information systems and the types of remediation and mitigation techniques available in your industry, and for your organization.
  2. Identify the purpose and function of firewalls for organization network systems, and how they address the threats and vulnerabilities you have identified.
  3. Also discuss the value of using access control, database transaction and firewall log files.
  4. Identify the purpose and function of encryption, as it relates to files and databases and other information assets on the organization’s networks.