After reading the article, we all realized that hackers also have their own "identities" within themselves. Not all hackers have the sole purpose of getting money or gaining personal glory. Most of them also do these things for the sake of having fun, a way to relieve themselves and to identify their "belongingness". Aside from this, we found out too that not all hackers are crackers and not all crackers are hackers. Hackers mostly intrude in the system to gain information while crackers mostly do their thing for their benefit without even thinking of the consequences of their actions. Furthermore, ethics also exist in the world of cybercrime, because most of them know their limitations and capabilities, as such the existence of their modus operandi, ritual and signature. These things could either help them be known, and let their computer prowess be exposed.
In addition to this, hacking really is a very extensive and time-consuming, mind-bending, patience-needing activity because hackers do need extensive research activities about their target as well as knowing how to intrude on the system and to reach their target. Hacking is a very tedious activity because everything that is involved in it needs to be perfect to enable the hacker to reach its target successfully, hide their identities and escape from the "crime scene".
As future Network Administrators, having read this article helps us realize the real thing. If hacking is tedious, how much more, we, the network administrators deal with this "perpetrators". Like in a game of chess, one has to think 3-4 moves before the opponent wins game. That is why, we have to predict the next action of the hacker before it gets worse.
Network Security
As technology advances, so does network perpetrators...
Thus, prevention is always better than cure.
Wednesday, August 13, 2008
Thursday, June 19, 2008
Security Mechanisms
Protecting the network does not necessarily mean that the protection will come from an outside source, but also from the local administrator. They basically hold the foundation in maintaining a safe and secure network. There are some steps to take in providing utmost security to the network. Some of these steps are:
Check the latest security services available
Purchased and install software or programs that could help prevent security attacks. Certain tools and gadgets are also available in keeping the system safe and secured.
Assigning secured passwords
Prevention is always better than cure. Thus, avoid using default passwords or commonly used dictionary terms.
Assess theft potential
Constantly check the computers, laptops, portable hard disks, data backups on CD, anything – make sure to assess the system's safety well.
Check network bandwidth
This could prevent end users of using the bandwidth "over the hedge" just by sending "junk" emails daily.
Data Backups
Make system backups, or rather schedule system backups every so often so that in case of data loss, there would be no problem.
Data Confidentiality
Encrypt data and files in the best way possible.
Disaster Recovery Plan
Consider drafting one if one doesn't exist yet. This is the number one reason why network attacks succeed, because if one had prepared to be attacked, the attack wouldn’t have been so bad, or ‘as’ bad had one not prepared for it.
Check the latest security services available
Purchased and install software or programs that could help prevent security attacks. Certain tools and gadgets are also available in keeping the system safe and secured.
Assigning secured passwords
Prevention is always better than cure. Thus, avoid using default passwords or commonly used dictionary terms.
Assess theft potential
Constantly check the computers, laptops, portable hard disks, data backups on CD, anything – make sure to assess the system's safety well.
Check network bandwidth
This could prevent end users of using the bandwidth "over the hedge" just by sending "junk" emails daily.
Data Backups
Make system backups, or rather schedule system backups every so often so that in case of data loss, there would be no problem.
Data Confidentiality
Encrypt data and files in the best way possible.
Disaster Recovery Plan
Consider drafting one if one doesn't exist yet. This is the number one reason why network attacks succeed, because if one had prepared to be attacked, the attack wouldn’t have been so bad, or ‘as’ bad had one not prepared for it.
Security Services
There are services that can be undertaken to prevent network attacks. These may not guarantee full protection, but still, it could do less harm than the actual damage that might occur. Some of the most common network security services are:
Using of Firewalls
A firewall is simply a group of components that collectively form a barrier between two networks.
Secure Modems; Dial-Back Systems
If modem access is to be provided, this should be guarded carefully. The terminal server , or network device that provides dial-up access to the network needs to be actively administered, and its logs should be examined for strange behavior. Also, its passwords need to be strong -- not ones that can be easily guessed. Accounts that are inactive should be disabled. In short, it's the easiest way to get into the network remotely, so guard it carefully.
Crypto-Capable Routers
Virtual Private Networks
Antivirus Protection
Install the "strongest" antivirus software that is available on the market and make sure that the virus database is updated and the system is scheduled to have a regular full scan.
Crypto-Capable Routers
This is a feature being built into some routers with the ability to use session encryption between specified routers. Because traffic traveling across the Internet can be seen by people in the middle who have the resources and time to snoop around, these are advantageous for providing connectivity between two sites, such that there can be secure routes.
Virtual Private Networks
Virtual Private Networks provide the ability for two offices to communicate with each other in a way that it looks like they're directly connected over a private leased line. The session between them, although going over the Internet, is private (because the link is encrypted), and the link is convenient, because each can see each others' internal resources without showing them off to the entire world.
Windows Updates
Check if the system is patched up. It's important to patch up these systems frequently, the ‘security’ hot fixes come out very often and are many times so important that if not installed, will leave the system or hundreds of systems, open to the latest and greatest piece of malware out there.
Windows Updates
Check if the system is patched up. It's important to patch up these systems frequently, the ‘security’ hot fixes come out very often and are many times so important that if not installed, will leave the system or hundreds of systems, open to the latest and greatest piece of malware out there.
Antivirus Protection
Install the "strongest" antivirus software that is available on the market and make sure that the virus database is updated and the system is scheduled to have a regular full scan.
Wednesday, June 18, 2008
Security Attacks
Network security these days is a fast-paced and ever-increasing demand. Various attacks emerge almost everywhere regardless of whether it would directly affect you or not. Still, more and more people spend time and money to counter serious threats to their security.
There are various network security attacks, many of which can damage and destroy the network itself along with all the valuable data stored in it. Moreover, it can breach the confidentiality of the files that the network is keeping safe and secured. Some of the most common forms of attacks are as follows:
IP Spoofing
In this kind of attack, a host claims to have the IP address of another. Since many systems (such as router access control lists) identify which packets may and may not pass based on the sender's IP address, this could be a useful technique to an attacker: he can send packets to a host, perhaps causing it to take some sort of action. Moreover, some applications allow login based on the IP address of the person making the request.Guessing of usernames and passwords (unauthorized access)
This is especially effective when the root or administrator password is weak, or when a system is set with default passwords that people don’t even bother to change. Furthermore, there are a lot of programs that have been specifically designed to crack passwords using the ’brute force’ method. A bad password on a Microsoft Windows system can be cracked in less than a second. Worse still, some systems send passwords over the network as clear text. There are plenty of tools available to collect those too. An example would be using a key logger to record the keystrokes of an authorized user.
The main network security attack that can be perpetrated via email is by using email as a means of sending worms which can be carried into the very heart of the network. This goes to show why email is so popular as a means for network security attacks.
Worms & Trojans
An unauthorized user more or less aims to install a malicious software or program on the system. The worm will then hide its presence from the administrator of the system for as long as possible, and will only do the tasks the attacker has "instructed" it to do. Some worms can even be connected to after installation and be given new instructions.
Wireless Specific Network Security Attacks
A wireless network is different from fixed networks in many ways. From a security perspective the biggest difference is that a fixed network has a well defined boundary while a wireless network doesn’t provide such an easily defined boundary. Thus, anyone can easily gain access to the network unless a password is given or it is hidden.
Phishing
This is a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDs and passwords through impersonation. A fake website is then created that is similar to that of a legitimate organisation, typically a financial institution such as a bank or insurance company. An email is then sent requesting that the recipient access the fake website, which will usually be a replica of a trusted site, and enter their personal details, including security access codes. The page looks genuine, because it is easy to fake a valid web site. Any HTML page on the web can be modified to suit a phishing scheme.
Phishing
This is a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDs and passwords through impersonation. A fake website is then created that is similar to that of a legitimate organisation, typically a financial institution such as a bank or insurance company. An email is then sent requesting that the recipient access the fake website, which will usually be a replica of a trusted site, and enter their personal details, including security access codes. The page looks genuine, because it is easy to fake a valid web site. Any HTML page on the web can be modified to suit a phishing scheme.
Subscribe to:
Comments (Atom)