Saturday, February 29, 2020

A Man In The Middle Attack Computer Science Essay

A Man In The Middle Attack Computer Science Essay Today computer networks are used to transmit large amounts of data which may or may not contain sensitive information. Within this document I will be discussing ways in which your networks may become venerable to attacks. Man in the middle attacks, spanning tree attacks, security issues related to trunking, and security issues relating to identity spoofing. What is a Man in the middle attack? Man in the middle attack is a name given to a type of attack where the person intercepts communication being sent across a data network. This type of attack is also known as a Bucket-brigade attack, Fire brigade attack, Monkey-in-the-middle attack, Session hijacking, TCP hijacking, TCP session hijacking etc. Man in the middle attack is an attack that is usually performed on a internal network. Man in the middle attacks are where hackers introduce a rouge device onto the network then intercept communication between two network devices. This is done by sending out a series of ARP requests and ARP responses to two devices making them think that they are talking to each other. An example of a man in the middle attack would consist of two hosts, host one and host two. The hacker would connect a rouge device, host three, most likely on the same switch that both host one and two are connected to. Once that he is able to communicate on the network he would then send out ARP requests and responses to both host one and two making them believe that he is the other host. This will make host one and two re-route there connection through host three. once host one and host two are communicating between each other via the new connection established by host three, the hacker will now be able to capture packets sent between them. Once an attacker has performed a man in the middle attack, they can use this in a number of ways for example Public Key Exchanging, Command Injection, Malicious Code Injection, Downgrade Attacks etc. There are many tools available that network managers will use in order to monitor their networks. These tools can also be used from a hackers point of view as they allow the hacker to capture packets that are being sent across the network. This essentially allows the hacker to see what you are doing. The following tools are commonly used for capturing and analysing network traffic by an attacker WiresharkÂÂ ® is a network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It has a rich and powerful feature set and is world’s most popular tool of its kind. It runs on most computing platforms including Windows, OS X, Linux, and UNIX. Network professionals, security experts, developers, and educators around the world use it regularly. It is freely available as open source, and is released under the GNU General Public License version 2. http://wireshark.com Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.

Thursday, February 13, 2020

Attitudes,values and job satisfaction Research Paper

Attitudes,values and job satisfaction - Research Paper Example This becomes a problem when the recruited personnel are unable to deliver on their mandate or bring the organization (Robins & Judge, 2013). Financial accounting, reporting and advising are perhaps the areas plagued the most by the problem of dishonesty. Accountants fabricate financial statements in bid to either cover up for the company money they have used on personal spending, or for money they want to rob the organization. On the other hand, audit firms are bought into covering up a company’s dishonest or fraudulent financial deals hence reporting inaccurate information to regulatory agencies and authorities such as Securities and Exchange Commission (SEC). Some financial advisers collude with organizations in influencing potential clients to join their investment deals even when they would have objectively advised against them. Dishonest financial accounting, reporting and advising can affect negatively on organizational attitudes (Wilson, 2004). Dishonesty has adverse effects on job satisfaction. Rationalization makes dishonest employees justify their dishonest conduct on a cost-benefit analysis. The rewards that come with dishonesty are short-lived and they haunt when the person enjoying realizes that these rewards would have gone into helping other deserving people. Additionally, dishonesty affects job satisfaction when a person in the workplace, especially one in a senior position, unfairly denies an employee some benefits and gives them to another person. This is what happens when promotion opportunities are given to people undeservedly and unequally. Employees are dissatisfied with their work when dishonest conduct brings strife and wrangles amongst them (Robins & Judge, 2013). An issue that contributes to the propagation of dishonesty in the workplace is the lack of elaborate oversight measures. When incumbents are not assessed for dishonesty, it leaves a leeway for them to flout an organization’s culture and values.

Saturday, February 1, 2020

McClellands Theory of Needs Essay Example | Topics and Well Written Essays - 1000 words

McClellands Theory of Needs - Essay Example Furthermore the essay also includes the way in which this theory has impacted me in the process of motivating others in the workplace. It is already mentioned earlier that according to McClelland there are three different classes of needs – need for achievement, need for power and need for affiliation. Need for achievement is referred to the internal drive to excel. Such need is responsible for creating a tendency for setting moderately difficult goals which involve moderate risks. Furthermore this need results in a preference regarding situations where personal responsibility is associated with outcomes. Need for power, on the other side, is the need of making others behave in the way in which the person wants. This type of need generates a desire of influencing others and a tendency of advocating riskier positions. The last need is the need for affiliation that is referred to the desire for close and friendly relationships with the co-workers (Robbins & Judge, 2007). Such need is mainly responsible for making people like others. McClelland and all his associates who are involved in the research behind the development of such a crucial theory mainly focused on the first type of need – need for achievement. McClelland’s ‘needs theory’ is one of the most important motivating theories because it is one of those rare theories that are properly supported by extensive research. Furthermore the theory involves three of the most important aspects that are integrally related to the motivation of an individual in a particular organization. According to Charleston C. K. Wang, â€Å"McClelland was careful to note that there is not a one-to-one correspondence between a person’s needs and behavior† (Wang, 1993). It is also found that McClelland used to believe that most of the effective managers have high need for power and low need for affiliation.