Tangible and intangible loss of successful spoofing:
• Economic Loss
Don't use plagiarized sources. Get Your Custom Essay on
Question: 20 points) itis and complete answer for each question. A few sentences or a shorr would be suffic……
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT!
– May occur when valuable data is lost or duplicated
– Surreptitious nature of a successful spoofing attack
• Company might not know what happened or when
• Strategic Loss
– Loss of strategic data that outlines events planned for the future
– Could lead to loss of both money and goodwill for the spoofed company
• General Data Loss
– Usually has less of an impact than the first two categories of losses
– Comes from unsecured documents used by employees
• Working on various projects or engaged in the day-today business of the company
To avoid or defend against IP spoofing:
– Wherever possible, avoid trust relationships that rely upon IP address only
– On Windows systems—If you cannot remove it, change the permissions on the $systemroot$hosts file to allow read only access
– On Linux systems—Use TCP wrappers to allow access only from certain systems
– Install a firewall or filtering rules
– Use encrypted and secured protocols like IPSec
– Use random ISNs
To avoid or defend against ARP poisoning:
– Use methods to deny changes without proper authorization to the ARP table
– Employ static ARP tables
– Log changes to the ARP table
Hope it helps 🙂