Академический Документы
Профессиональный Документы
Культура Документы
NETWORK SECURITY
NETWORK
THE PURE DEFINITION OF COMPUTER NETWORK REFERS TO THE INTERCONNECTION OF THE SYSTEMS IN ORDER TO EXCHANGE INFORMATION.
Internet
What is the Internet? The Internet is the world's largest network of networks . When you want to access the resources offered by the Internet, you don't really connect to the Internet; you connect to a network that is eventually connected to the Internet backbone , a network of extremely fast network components.
IP ADDRESS CLASSES
CLASS A B C D E RANGE 1.0.0.0 -127.255.255.255 128.0.0.0-139.255.255.255 140.0.0.0-191.255.255.255 192.0.0.0-239.255.255.255 240.0.0.0-247.255.255.255
ATTACKS ON IP ADDRESS
ATTACK THROUGH IRC. ATTACKING THROUGH E-MAIL. ATTACKING THROUGH SCRIPTS. IP SPOOFING. IP SESSION HIJACKING.
HOST-----SYN----SOURCE SOURCE----ACK-----HOST
If connection is established
ATTACKS ON TCP.
1.SYN FLOOD ATTACK. 2.FIN ATTACK 3 NULL ATTACK
ATTACKS ON UDP.
1 IN THIS ATTACK THE HACKER TRIES TO CREATE INFINITE LOOP BETWEEN TWO UDP CONNECTION USER.
RISK MANAGEMENT
ITS A GAME OF SECURITY WHERE THE ORGANIZATION DECIDES HOW MUCH RISK IS ACCOMNIED AND HOW MUCH SECURITY THEY CAN PROVIDE.
DDOS ATTACKS
1.PING OF DEATH 2.TEAR DROP 3.SYN FLOODING 4.LAND ATTACK. 5.DISTRIBUTED DOS ATTACK.
TROJANS ATTACKS
TROJAN IS A ONE KIND OF SOFTWARE THAT IS INSTALLED ON EITHER ON THE SYSTEM OF VICTIM OR ON THE ATTACKERS SYSTEM THAT CAN BE USED FOR MALLICIOUS PURPOSE.
FIREWALLS
ITS A SOFTWARE OR HARDWARE OR COMBINATION OF SOFTWARE & HARDWARE THAT FILTERS THE ALL INCOMING MESSAGE.
CONCLUSIONS:SECURITY IS REALLY A DIFFICULT TOPIC.EVERYONE HAS DIFFERENT IDEA WHAT SECURITY IS AND WHAT LEVELS OF RISK ARE ACCEPTABLE.THE KEY TO BUILD SECURE NETWORK FOR AN ORGANISATION IS TO DEFINE WHAT SECURITY MEAN TO YOUR ORGANISATION.ONCE IT HAS BEEN DEFINED EVERYTHING THAT GOES ON TO THE NETWORK CAN BE EVALUATED. SECURITY IS EVERYONES BUSINESS AND ONLY WITH EVERYBODYS COOPERATION AN INTELLIGENT POLICY WILL BE AVAILABLE
References:1 The New Lexicon Webster's Encyclopedic Dictionary of the English Language. New York: Lexicon. 2 R.T. Morris, 1985. A Weakness in the 4.2BSD Unix TCP/IP Software. Computing Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey. 3 S.M. Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communication Review, Vol. 19, No. 2, pp. 32-48, April 1989. 4 Y. Rekhter, R. Moskowitz, D. Karrenberg, G. de Groot, E. Lear, ``Address Allocation for Private Internets.'' RFC 1918. 5 J.P. Holbrook, J.K. Reynolds. ``Site Security Handbook.'' RFC 1244. 6 M. Curtin, ``Snake Oil Warning Signs: Encryption Software to Avoid.'' USENET <sci.crypt> Frequently Asked Questions File.
7 Shield your computer from internet crime. By Richard Mansfield 8 Internet security by Chris Prossie.. 9 Incident Response by KevinMandia. 10 802.7 security by Bruce Potter
ANY
QUERY ?