Saturday, April 28, 2012

Common Network Attacks, Threats and Solutions



Attacks:
(1)Identity Spoofing (IP Address Spoofing)

  -  Identity spoofing is the assumption of ip addresses that deceives networks and operating systems in identification. It is normally used on IP packs. One such program in use for IP spoofing would be the NetShade(on MAC). You may find more information on the video below.

(2)Denial-of-Service Attack(DDoS)

   -   A Denial-of-Service attack usually prevents normal use of a computer or network by users, which includes loss of access to network resources and a temporary shutdown due to overloading of IP packets.
______________________________________________________________________

Threats:

 Phishing
   - Phishing is the acquire of any information using a bogus email message or a bogus message in instant messaging via social engineering. A link will be included in those messages, which is the link which the hacker takes advantage of the information entered in the link by unsuspecting victims.

Check the video out below on how it works:







_______________________________________________________

Solutions:

   Penetration testing
      - It is a method of evaluating security on a network or a computer by staging an attack on the
             systems in order to find out the weaknesses in them. Some common programs used for
             penetration testing is backtrack. The video below is a simulation of a penetration testing on  
             passwords.









References:
http://technet.microsoft.com/en-us/library/cc959354.aspx

http://www.csoonline.com/article/472866/top-9-network-security-threats-in-2009

http://en.wikipedia.org/wiki/Phishing

 

2 comments:

  1. This comment has been removed by the author.

    ReplyDelete
  2. Hi, your videos are very informative which gives people a good understanding of what you are trying to explain.

    ReplyDelete