Saturday, February 22, 2020

Cyber Threats Assignment Example | Topics and Well Written Essays - 1000 words

Cyber Threats - Assignment Example ARP poisoning Address Resolution Protocol spoofing, also referred to as ARP flooding, or ARP poisoning/ARP poison routing is a mechanism that is employed when one wants to attack an Ethernet wireless or wired network. This technique may allow the attacker to undertake packet sniffing. In case of email, the attacker will sniff the traffic sent by one host to another host ion the network (Tan & Ruighaver 2005). In the normal operations of ARP, there will be broadcasting of host IP address and MAC addresses. When some host wants to send some information to a certain host, it will send a broadcast asking who has a certain IP address. The host with the respective IP address will reply to the request and will do so with the correct IP address and the MAC address. This communication happens with a lot of gullibility (Salomon &Cassat 2003). This is because, ARP does not have authentication. The reply and the host which replies that it has the said IP address and MAC address will not be authe nticated. In ARP communication, there is no authentication of the hosts. The host replying will be taken to be correct. ARP does not have a mechanism of correcting the information that it gets from the hosts which are communicating in the network (Salomon & Cassat 2003). Since there is no authentication of the ARP requests and replies, the attacker will insert a wrong IP address to a computer cache. The ARP request will then be fed with the wrong IP address. This is called ARP poisoning, that is the ARP table has been poisoned with wrong information. The attacker manages to lie to the machines and to the people in the network (Russell & Gangemi 2011). What these attacks do is that they will get what is taking place with the two parties. When the parties communicate, the attacker will get the packets and get the email password of either parties or even both parties. They can then use the passwords to undertake attacks (Peltier 2005). The possibility for an IP address to be associated with any given MAC address is another loophole for attacks. They are able to undertake many forms of attacks to the unsuspecting users and hosts in the network. In this state, other forms of network attack can be experienced. Other common forms of attacks that can be experienced include man-in-the-middle attacks, MAC flooding, and denial of service attacks (Orebaugh, Ramirez & Beale 2007). Man-in-the-middle attacks This is an attack which is common in local area networks. This attack is a form of active and aggressive eavesdropping where the attacker will create independent connections between the parties communicating so that the attacker will feign either parties communicating. In the end, the parties communicating will think that they are having a private communication and yet in the real sense, the communication is being controlled by eth attacker (Neumann 2006). A hacker can make use of ARP spoofing/poisoning to attack the communication between communicating parties. This can sim0ply be undertaken by having the attacker sending ARP reply to a router. The router could be communicating with computer A. The router will send information regarding its IP address and the MAC address thinking that the requesting agent is computer A. After getting this information, the attacker will also send an ARP replies to machine A. Machine A will respond to the reply thinking that the machine is a router. It will then send information to the attacker. After getting the IP and MAC address, the attacker will then use the operating system characteristic that is referred to as IT forwarding. This feature will

Thursday, February 6, 2020

Christian Ethics Essay Example | Topics and Well Written Essays - 3000 words

Christian Ethics - Essay Example (MacIntyre 1981, 169-89) In his usage, practices are socially established activities that lead those who participate in them to appreciate certain things as goods and to internalize standards f excellence in achieving them. Practices are done for their own sake, such as friendship, not for additional ends, such as practicing free throws in basketball. Martha Nussbaum recommends the engaged reading f literature as a practice that expands moral perception and empathy. This skill is a necessary component f humanistic education, even for lawyers and scientists. (Nussbaum 1997, 85-112) Diana Fritz Cates argues that the practice f committed friendship trains desires and moral vision in the virtue f compassion. The willingness to engage others, even strangers, in their suffering gains added meaning as a practice within a Christian frame f reference. Maria Antonaccio describes recent attention to "practices" as conscious efforts at moral formation. (Antoncaccio 1998, 69-92) She distinguishes between an "existential" model f askesis advocated by Pierre Hadot's study f Stoic sources, a "therapeutic" model in Nussbaum, and an "aesthetic" approach in Michel Foucault. Antonaccio doubts that these attempts to ground moral development in practical exercises can succeed while their authors refuse to consider a normative theory f human nature and moral ideals. Although theories f human nature or development are unpopular in an era that stresses particularity and pluralism, she writes that "some form f theoretical reflection is necessary in order to judge what form f therapy' human beings need, and to assess critically the processes f formation already underway." Some writings on practices use a faith tradition to specify a normative view f human nature that guides moral and spiritual development. Spiritual practices are being recognized as central to Christian moral formation. Dorothy C. Bass edited a collection f essays on 12 central Christian practices, such as hospitality, keeping Sabbath, and forgiveness, that shape the mind and heart in the Christian way f life. With Craig Dykstra she writes that "when we see some f our ordinary activities as Christian practices, we come to perceive how our daily lives are all tangled up with the things God is doing in the world." Catherine M. Wallace analyzes the virtue f fidelity as a constitutive element f the practice f marriage. Fidelity has more than instrumental value in keeping a marriage intact; more importantly, it does something to the spouses by training their desires and reshaping their identities over time. (Kotva 1997, 272-90) From the perspective f evangelical Christianity, Brad J. Kallenberg writes: "Christianity cannot be explained or understood without reference to a distinctive cluster f practices. In order to participate in the tradition called Christianity one must necessarily participate in these practices." (Kallenberg 1997, 7-29) He highlights certain practices f community moral formation: witness, worship, works f mercy, discernment, and discipleship. Reinhard Hutter points out that Luther redefined the marks f the Church to be practices. There is an