Need help with your Assignment?

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

Potential Network Threat

Potential Network Threat

Potential Network Threat

Need help with your assignment ? Get in touch with us.

One potential network threat an organization may face is Man-in-the-middle attacks. MITM attacks are cyber-security attacks that permit attackers to listen to communication between two parties illegally. The person executing this threat often targets communication that was supposed to be private under normal conditions (Mallik, 2019, p. 113). Under this type of threat, the hacker intercepts the public key sent by party A to party B and sends a forged message to party B. In this case, the forged message is often composed of the attackers’ public key. Since person B believes that the message is from person A, he encrypts it with the hackers’ public key and sends it back to A (Mallik, 2019, p. 118). The attacker then intercepts this information, alters it, and re-encrypts it using his public key, thus enabling him to eavesdrop on the communication between the two parties. Some examples of MITM attacks include AP spoofing, ARP spoofing, Wi-Fi hacking, and HTTPS spoofing.

Controls/Protocols that Need to be Implemented to Defend Against Attack

One of the potential controls that may be implemented to defend against MITM attacks in the organization is ensuring that the connections are secure. An organization’s first defense line is having a secure internet connection. This control measure calls upon employees of an organization to only visit websites with a secure HTTP connection by utilizing a secure socket layer technology. SSL technology is important because it prevents MITM attacks on an organization’s network (Ylli & Fejzaj, 2021, p. 199). Employees of an organization would have an easy time identifying secure websites because most of them begin with https:// and not http://. Many browsers also show a padlock icon in the URL field as a sign of authenticity. Apart from the organization sticking with a secure website, the employees should also be advised on the importance of avoiding the usage of public Wi-Fi (Ylli & Fejzaj, 2021, p. 199). This is because hackers can easily insert themselves between the users and the websites they visit.

The other protocol that should be implemented to defend the organization against MIM attacks is the virtual private network (VPN). Using a VPN when connecting online is essential because it ensures that the data one sends online is encrypted. This encryption prevents the MITM attack from penetrating the traffic on the network (Ylli & Fejzaj, 2021, p. 200). Even when a hacker manages to access one’s network, the encrypted data hinders the hacker from reading an individual’s messages or identifying the websites the user is likely to visit (Ylli & Fejzaj, 2021, p. 201). The other important aspect of this control mechanism is that if someone must connect to public Wi-Fi, connecting through a VPN provides sufficient protection.

Purposes of the Controls or Protocols I Recommended for My Business

A secure internet connection is important to an organization because, besides protecting its data, it also protects the organization against ransomware. Data is a valuable aspect concerning how individuals or business execute their activities. In a business setting, data often consists of marketing materials, financial information, and human resource information. Some crucial data most businesses prefer to keep private relates to financial information. For instance, a company like Thawte uses SSL technology to prevent MIM attacks, hence making their data safe from outside attacks (Ylli & Fejzaj, 2021, p.202). On the other hand, using a VPN keeps an organization’s network safe from ransomware. After suffering data breaches in recent years, Colonial Pipeline developed its VPN that makes the organization’s connection to online platforms safer than before (Ylli & Fejzaj, 2021, p. 203). The organization prevented the hackers from accessing information while in transit.

The Significance of Using OSI, TCP/IP, And SANS 20 Controls in Network Protection

The OSI and TCP/IP protocols are important because they provide a platform for data transmission across a network. The OSI model and the TCP/IP protocol ensure that data is transmitted more securely and efficiently between one or more devices (Kaur et al., 2023, p. 128). These control measures are important because they establish a data encryption and authentication framework, preventing unauthorized access to the organization’s information system (Kaur et al., 2023, p. 131). Furthermore, the SANS control aids in securing and protecting the computer network. An example of a protocol that may be found in a security policy is the surveillance system.


Kaur, K., Kaur, M., Kaur, K., & Madaan, A. (2023). A Comparative Study of OSI and TCP/IP Models. International Journal of Engineering and Management Research13(2), 127-135.

Mallik, A. (2019). Man-in-the-middle-attack: Understanding in simple words. Cyberspace: Journal Pendidikan Teknologi Informasi2(2), 109-134.

Ylli, E., & Fejzaj, J. (2021). Man in the Middle: Attack and Protection. In RTA-CSIT (pp. 198-204).


We’ll write everything from scratch


Imagine you oversee cybersecurity operations for a major online sales company. It’s imperative that you have the most effective cybersecurity measures available at your disposal. Resolution after an attack has occurred is not a viable solution. So, your job is to make sure an attack never occurs. Recalling the fundamental goals, benefits, challenges, and countermeasures you’ve learned so far:

Potential Network Threat

Potential Network Threat

Create a 2- to 3-page MS Word report for your company, detailing the following:

Identify one potential network threat to your business.
Recommend 2 controls or protocols that need to be implemented to defend against attacks and limit the risk you identified for your business.
Describe 2 purposes of the controls or protocols you recommended for your business. For each, list 1 example where these controls or protocols were used in businesses. What did they protect against?
Discuss 1 significance of using OSI, TCP/IP, and SANS 20 Controls in network protection.
Name one control and protocol you find in a security policy.

Cite any sources to support your assignment.

Format your citations according to APA guidelines.

Order Solution Now