Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

How serious do you think these combinations of assets, threats, and potential weaknesses are? 1 to 2 paragraphs. see attached for reference. Evaluate the potential

How serious do you think these combinations of assets, threats, and potential weaknesses are? 1 to 2 paragraphs. see attached for reference.

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

Evaluate the potential weaknesses (Matt Sciarrino) lhe three weaknesses that were previously discussed are the potential for DDoS attacks, the fact that IPSec VPN Gateway configuration files contain the PSK in plain text, and the inappropriate use of wildcards or group PSK's. Each one of these vulnerabilities are extremely dangerous if they are not addressed throughout the initial configuration. These three weaknesses each exploit different areas of the IPSec protocol Two different types of DDoS attacks were discussed in our weeK 4 course project; NIP Amplification attacks and CRL/OCSP attacks Fven just these DDoS attacks targets different aspects of IPSec security, all of which are required to be enabled for IPSec. The first type of DDoS attack subject to vulncrability is NTP Amplification. NTP Amplification makes use of the fact that NTP must be enabled when setting up a public key infrastructure (PKI) to use digital signatres. NTP Amplification exploits the "get monlistrequest that is sent from a client to an NTP server. This request can be modified to request the last 600 hosts that pinged that particular NTP server and be sent through UDP traffic. This is accomplished when an attacker sends d (ontiuos 'get mon,st request to an NTP server while spoofing the victim's IP in the sent packet. The next attack is a CRL/OCSP DDoS attack. These protocols are different, yet similar at the same tme. A CRT, Certificate Revocation T.ist

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions