Networks Under Attack - The Internet has become mission critical for many institutions today, including large and small companies, universities, and government agencies. Many individuals also rely on the Internet for many of their professional, social, and personal activities. |
|
Business Related Topics...
Computer Related Topics...
Entertainment, Recreation & Sports Related Topics...
Health & Fitness Related Topics...
Home & Family Related Topics...
Shopping Related Topics...
Would you like to submit articles to our site? Have a question or a problem?
You are here: DIME Home > Programming and Scripting > Networks Under Attack
The Internet has become mission critical for many institutions today, including large and small companies, universities, and government agencies. Many individuals also rely on the Internet for many of their professional, social, and personal activities.
Author: Imran Rashid
Date: Dec 6, 2009 - 10:47:10 AM
The
Internet has become mission critical for many institutions today,
including large and small companies, universities, and government
agencies. Many individuals also rely on the Internet for many of their
professional, social, and personal activities. But behind all this
utility and excitement, there is a dark side, a side where "bad guys"
attempt to wreak havoc in our daily lives by damaging our
Internet-connected computers; violating our privacy, and rendering
inoperable the Internet services on which we depend [Skoudis 2006].
The field of network security
is about how the bad guys can attack computer networks and about how
we, soon-to-be experts in computer networking, can defend networks
against those attacks, or better yet, design new architectures that are
immune to such attacks in the first place. Given the frequency and
variety of existing attacks as well as the threat of new and more
destructive future attacks, network security has become a central topic
in the field of computer networking in recent years. One of the
features of this fourth edition of this textbook is that it brings
network security issues to the forefront.
We'll begin our foray into network security in this section, where
we'll briefly describe some of the more prevalent and damaging attacks
in today's Internet. Then, As we cover the various computer networking technologies.We'll
consider the various, security-related issues associated with those
technologies and protocols armed with our newly acquired expertise in
computer networking and Internet protocols, we'll study in-depth how computer networks
can be defended against attacks, or designed and operated to make such
attacks impossible in the first place. Since we don't yet have
expertise in computer networking and Internet protocols, we'll begin
here by surveying some of today's more prevalent security-related
problems. So we begin here by simply asking, what can go wrong? How are
computer networks vulnerable? What are some of the more prevalent types
of attacks today? The bad guys can put malware into your host via the
Internet. We attach devices to the Internet because we want to
receive/send data from/to the Internet. This includes all kinds of good
stuff, including Web pages, e-mail messages, MP3s, telephone calls,
live video, search engine results, and so on. But, unfortunately, along
with all that good stuff comes malicious stuff--collectively known as
malware--that can also enter and infect our devices.
Once malware
infects our device it can do all kinds of devious things, including
deleting our files; installing spy ware that collects our private
information, such as social security num-hers, passwords, and
keystrokes, and then sends this (over the Internet, of course!) back to
the bad guys. Our compromised host may also be enrolled in a network of
thousands of similarly compromised devices, collectively known as a
botnet, which the bad guys control and leverage for spam e-mail
distribution or distributed denial-of-service attacks(soon to be
discussed) against targeted hosts. Much of the malware out there today
is self-replicating: once it infects one host, from that host it seeks
entry into other hosts over the Internet, and from the newly infected
hosts, it seeks entry into yet more hosts. In this manner, self-replicating malware
can spread exponentially fast. For example, the number of devices
infected by the 2003 Saphire/Slammer worm doubled every 8.5 seconds in
the first few minutes after its outbreak, infecting more than 90
percent of vulnerable hosts within 10 minutes [Moore 2003). Malware can
spread in the form of a virus, a worm, or a Trojan horse [Skoudis
2004]. Viruses are malware that require some form of user interaction
to infect the user's device. The classic example is an e-mail
attachment containing malicious executable cods. If a user receives and
opens such an attachment, the user inadvertently runs the malware on
the device.
Imran Rashid has working knowledge about windows operating systems.For more information visit
Free CCNA Tests
Free Windows Tutorials
HTML5 - The End of PSD to HTML Slicing Providers?Oct 18, 2010 - 11:20:32 AM In 2009 the World Wide Web Consortium (W3C) decided to concentrate their efforts on HTML5, a new revision of HTML, rather than XHTML2. HTML5 is strongly supported by Apple, Opera, Mozilla, Microsoft, Google and other leading IT companies and web browser developers. All this means that HTML5 is becoming a mainstream of the Internet.... [Read the full story] |
Top 10 Points to Remember While Doing Web DevelopmentSep 17, 2010 - 6:44:25 AM The web developers have a vital role to play in the success of the online business as they are actual programmers of the web site. No one is going to fence on the fame of the web development in today’s competitive world. This is a high tech decade and you have to be on your toes all the time to contend well. The design of the website sets the tone for the success. If its attractive people would love it but if it’s not they are going to leave the page next moment.... [Read the full story] |
Top 5 PHP Frame Work List to speed up your Programming efficiencyJan 9, 2010 - 3:23:32 AM PHP is a widely used and open source scripting language which designed for web development to build dynamic web pages. PHP Applications are normally hosted or found on Linux Servers. Its functionality same as Windows platform by Active Server Pages Technology.... [Read the full story] |
Ethical Hacking for Strong SecurityJan 7, 2010 - 12:53:55 PM Ethical hacking is a process that utilizes the same techniques that malicious hackers use, but for the purpose of assessing security threats to your organization’s information assets. Entities of all types (private businesses, government agencies, non-profit corporations, Hospitals, Universities, Etc.) need strong IT security now more than ever. It is imperative that IT security personnel learn “Black Hat” (malicious) hacking techniques in order to counter or prevent attacks on critical IT systems and assets.... [Read the full story] |
Search for articles: |
Latest Articles in All Categories |
Putting Up a Small Commercial Printing Business |
So You Might Be Unemployed And Desire To Become A San Francisco Real Estate Investor Now |
Meditation and Mindfulness: Dealing With Emotion |
CPA Websites: Five Essential Ideas for Composing Convincing Articles |
Set Goals In Order to Come Up With Your Action Plan |
Is the Air in Your Home Safe to Breathe? |
Coarse Fishing Tackle Review: The JW Young 13ft Trotter Rod |
Section 1031 Exchanges For San Diego Real Estate Investors |
Phoenix Real Estate Investing For Highest Possible Earnings |
Legendary are the Volk Racing TE37 Wheels |
Developing the Next Generation Wall Station (ChaseDesk™) for Healthcare - A Case Study |
What are step down transformers? |
Introducing Sharehype, the Revolutionary Tool for Online Marketers |
Rewards To Shopping For Austin Real Estate On The Web |
Hydroponics for Beginners |
Would you like submit your articles and have them approved on a priority status? Find out more about how you can become a Priority author for pennies a day! Click here.
Dime-co.com Home |
|
|
|
|
|
|
|
|
|
|
|
|
|
Disclaimer: Dime-Co.Com is an online information article and video article network. All articles, video articles, comments, and other features herein are for informational purposes only and are provided "as is" without warranties, representations or guarantees of any kind. The views and opinions expressed in an article, comments, links or blogs are the author's own, and not necessarily those of dime-co.com's owners. For full disclaimer, please read our TOS.