Hackers attacks at the network software

Posted: September 14, 2012 in Articles
Tags: ,

Hackers attackThe network software is the most vulnerable, because the communication channel through which messages are transmitted, most often not protected, and anyone who may have access to the channel, respectively, can intercept messages and send your own. Therefore, at the level of the ACT, the following hacks:

– listening to the local network segment (within the same LAN segment, all the connected computer can receive messages addressed to other computers on the segment, and therefore, if the computer is connected to some hacker LAN segment, then it is available all the information exchange between computers in this segment);

– interception of communications on the router (if a hacker has privileged access to the network router, it is able to intercept all messages passing through the router, and while total interception is impossible due to the large volume, extremely attractive to hackers is selectively intercepting messages containing passwords users and their e-mail);

– making a false router (by sending messages to the network of a special type hacker wants to be a computer network has a router, and then have access to all messages passing through it);

– imposition of messages (messages sent to the network with a false return address of the network, the hacker switches on his computer has a network connection and as a result receives the rights of users whose connections have been fraudulently diverted to the hacker’s computer);

– denial of service (the hacker sends a network message of a special form, then one or more computer systems connected to the network, in whole or in part out of order).

As hackers attacks at the network software provoked open network connections,, it is reasonable to assume that to reflect these attacks should be possible to protect the lines of communication, and thus hamper the exchange of information on the network for those who are not legitimate users.

Below are some of the ways that protection:

– maximum size limit computer network (the more the network, the harder it is to defend);

– Network isolation from the outside world (if possible should restrict physical access to the network from the outside, to reduce the possibility of unauthorized connection hacker);

– Encryption of network messages (thus you can eliminate the threat of interception of communications, however, the cost of performance and growth of open source software overhead);

– electronic signature network messages (if all messages sent over the network, supplied by digital signature, and thus unsigned messages are ignored, it is possible to forget the threat of imposing posts and about most of the threats of denial of service);

– using a firewall (firewall is a subsidiary remedy, used only in the event that a computer network can not be isolated from other networks because the firewall is often not able to distinguish between potentially dangerous network message from a perfectly innocuous, and as a result it is typical not only when the firewall does not protect the network from hackers, and even prevent its normal operation).

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s