Unit 32 Network System Security | vinay1010

Loading...
vinay1010 A topnotch WordPress.com site

Unit 32 Network System Security Posted on September 24, 2012 Are We Safe? week 4 P1 and P2 Denial of service attack- Denial of service- A denial of service attack is an effort to make one or more computer systems unavailable. It is typically targeted at web servers, but it can also be used on mail servers, name servers, and any other type of computer system. Denial of service attacks may be send from a single machine, but they typically use many computers to carry out an attack. Network bandwidth Server memory Application exception handling mechanism CPU usage The most common DOS attacks will target the computer’s network bandwidth or connectivity. Bandwidth attacks flood the network with such a high volume of traffic, that all available network resources are consumed and legitimate user requests can not get through. distributes dos attack is a tactic used to attack a victim from multiple compromised computers. Attacker installs a virus or Trojan software on compromised systems, and use them to flood a victim’s network in a way that the victim’s server cannot handle it.Sites that are attacked are prevented from doing business online. The result is often a loss in sales revenue or advertising revenue. Denial of Service attacks set out to remove a service from functional use by its clients. Web servers will stop serving web pages, email servers will stop accepting or delivering email and routers will go dark, taking you off the Internet all together. How to prevent DOS Attack Install a firewall, and configure it to restrict traffic coming into and leaving your computer Applying email filters may help you manage unwanted traffic. Full protection of data center applications against emerging network threats Maintain network performance even when under high volume network attacks Maintain excellent user response time even under attack Blocks attacks without blocking legitimate user traffic Brute force- brute force attack is a particular strategy used to break your password. This is the most widely used method of cracking passwords and it involves running through all the possible permutations of keys until the correct key is found. For example, if your password is 2 characters long and consists of letters and numbers – and is case sensitive, then a brute force attack would see a potential 3,844 different “guesses” at your password. brute-force attack may be able to gain access to an account eventually, these attacks can take several hours, days, months, and even years to run. The amount of time it takes to complete these attacks is dependent on how complicated the password is and how well the attacker knows the target. How Long Does It Take To Crack A Password The time required to crack a password is dependant on: How long the password is. How many characters are allowed in each position (uppercase, lowercase, numbers, special characters). Software Exploitation- A software exploitation attack is a type of software attack where an attacker attempts to gain access to a system or to sensitive data by exploiting a flaw or feature in an application.One of the most common bugs involves buffer overflows where an area of memory has been allocated by the programmer to store a specific amount of data. how to prevent it – it is impossible to completely eliminate the risk of software exploitations the threat can be reduced by keeping operating systems and applications patched with the latest vendor updates and to develop applications using programming languages such as C# and Java which provide managed environments which reduce the risk of some exploitations. (Virus) A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. The best ways to avoid virus infection are – Install an anti-virus solution and keep it up to date. Never open suspicious email attachments. Keep operating systems patched with the latest updates Trojans and Worms worms is – A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. Trojans is-A trojan horse is a program which appears to serve a useful purpose but actually contains malicious code which executes when the user runs the application. Trojan horses are typically used to open a back door to the system on which they are executed allowing an intruder to subsequently gain access how to prevent P2 US E O F FI RE WALL

You should also install a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack Root-kit- A root-kit is software that enables continued privileged access to a computer, A set of software tools used by a third party after gaining access to a computer system in order to conceal the altering of files, or processes being executed by the third party without the user’s knowledge ARP Cache Poisoning – is also known as man in the middle. when it gaining unauthorized access to the wireless network, the attacker may want to expand his influence by hijacking existing legitimate sessions. ARP, a very simple protocol, consists of merely four basic message types: An ARP Request. Computer A asks the network, “Who has this IP address?” An ARP Reply. Computer B tells Computer A, “I have that IP. My MAC address is [whatever it is].” A Reverse ARP Request (RARP). Same concept as ARP Request, but Computer A asks, “Who has this MAC address?” A RARP Reply. Computer B tells Computer A, “I have that MAC. My IP address is [whatever it is]” Identity theft – The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person’s name or identity in order to make transactions or purchases. Task 2 D1 Many mobile devices equal increased risks A large majority of people are not aware of how their mobile devices can compromise network security. For instance, look at the number of iPhones, iPads, feature phones and Android smartphones being launched and used by people these days. They all have different operating systems, which are constantly being upgraded and – as a result – can cause serious damage to the network. Unless they are prevented, it’s only a matter of time before problems occur. Social media can spread viruses Facebook, twitter and YouTube are here to stay. As businesses and consumers, we have come to rely on them more regardless of whether we are at home or at work or if we are using a desktop or mobile device meaning it will be just about impossible to permanently prevent access to social media across corporate IT environments. Therefore, having the ability to rapidly identify which devices are infected and to protect the network from social media viruses is critical, https://www.facebook.com/video/video.php?v=308031879304260¬if_t=video_processed

Report this ad

Report this ad

S H A R E TH IS : Twitter

Facebook

Like Be the first to like this.

This entry was posted in Uncategorized by vinay1010. Bookmark the permalink [https://vinay1010.wordpress.com/2012/09/24/unit-32-network-system-security/] .

Loading...

Unit 32 Network System Security | vinay1010

vinay1010 A topnotch WordPress.com site Unit 32 Network System Security Posted on September 24, 2012 Are We Safe? week 4 P1 and P2 Denial of service ...

63KB Sizes 4 Downloads 25 Views

Recommend Documents

No documents