Last Articles


Most popular password

Fake ARP-server on the Internet

Why can not I log in as an administrator from any location?

Идентификаторы защиты (SID)

Can you trust a domain that is connected to the Internet?

Administrative boundaries: the forest or domain?

The basic principles of security

Protection system in Windows - Fact or Fiction

Chronology of the ARPANET - INTERNET

Network Information Security: Myths and Realities Omnipotence hackers

Network security model and resource sharing

Remote attacks on distributed computing systems

Characteristics and mechanisms of implementation of standard remote attacks

Administrative methods to protect against remote attacks on the Internet

Control of virtual connections in the distributed CS

Control over route messages to the distributed CS

Pros and cons of a distributed aircraft with dedicated channels

Mythical remote attacks on the Internet

Malfunction host on the network

Substitution of one of the subjects TCP-connections on the Internet

Features of computer network security

  The main feature of any network system is that its components are distributed in space and the relation between them is physically carried out by means of network connections (coax, twisted pair, fiber, etc.) and software through the mechanism of communications.

   Moreover, all control messages and data sent between objects distributed computing system (CS), are transmitted across a network connection in the form of packet exchange.

   Network systems are characterized by the fact that, along with the usual (local) attacks, carried out within a single computer system, they apply a specific kind of attack, due to the allocation of resources and information in space. This so-called network (or remote) attack.

   They are characterized, firstly, the fact that someone could be thousands of miles away from the attacked object, and, secondly, that the attack could not be subjected to a specific computer, and information spreads through network connections. With the development of local and global networks is remote attacks are leading both the number of attempts, and on the success of their application and, accordingly, the security of aircraft with in terms of opposition to a remote attack is of paramount importance.

   Specificity distributed CS is that if the local Sun were the most frequent threats of disclosure and integrity, in network systems, as will be shown below, in the first place comes the threat of denial of service.

   Under a remote attack we mean information damaging effects on distributed computer systems, software implemented on the communication channels. This definition encompasses both features of network systems - distributed computers and distributed information.

   Therefore, we will consider two subtypes of such attacks - a remote attacks on the infrastructure and network protocols and remote attacks on telecommunication services. The first advantage of vulnerabilities in network protocols and network infrastructure, and the second - the vulnerability of telecommunications services. In this case, a network infrastructure, we understand the existing system of organization of relations between objects and the network used in the network of service stations.

Top 5 most read

The basic rules of safe behavior on the Internet

What to do if you forget the BIOS password

How to crack passwords?

Social engineering as a way of committing crimes in the sphere of computer information

You forget your password. What should I do? Part 3


Copyright © 2010 BRV ISTCOM S.R.L.- раскрутка сайта