Last Articles


Most popular password

Network Information Security: Myths and Realities Omnipotence hackers

Hackers and crackers, or what is good and what is bad?

Chronology of the ARPANET - INTERNET

Protection system in Windows - Fact or Fiction

The basic principles of security

Manager SAM and Active Directory

Administrative boundaries: the forest or domain?

Can you trust a domain that is connected to the Internet?

Идентификаторы защиты (SID)

Why can not I log in as an administrator from any location?

Network security model and resource sharing

Remote attacks on distributed computing systems

Characteristics and mechanisms of implementation of standard remote attacks

Fake ARP-server on the Internet

False DNS-server on the Internet

Substitution of one of the subjects TCP-connections on the Internet

Malfunction host on the network

Mythical remote attacks on the Internet

Dedicated channel communication between objects distributed CS

Features of computer network security

  The main feature of any network system is that its components are distributed in space and the relation between them is physically carried out by means of network connections (coax, twisted pair, fiber, etc.) and software through the mechanism of communications.

   Moreover, all control messages and data sent between objects distributed computing system (CS), are transmitted across a network connection in the form of packet exchange.

   Network systems are characterized by the fact that, along with the usual (local) attacks, carried out within a single computer system, they apply a specific kind of attack, due to the allocation of resources and information in space. This so-called network (or remote) attack.

   They are characterized, firstly, the fact that someone could be thousands of miles away from the attacked object, and, secondly, that the attack could not be subjected to a specific computer, and information spreads through network connections. With the development of local and global networks is remote attacks are leading both the number of attempts, and on the success of their application and, accordingly, the security of aircraft with in terms of opposition to a remote attack is of paramount importance.

   Specificity distributed CS is that if the local Sun were the most frequent threats of disclosure and integrity, in network systems, as will be shown below, in the first place comes the threat of denial of service.

   Under a remote attack we mean information damaging effects on distributed computer systems, software implemented on the communication channels. This definition encompasses both features of network systems - distributed computers and distributed information.

   Therefore, we will consider two subtypes of such attacks - a remote attacks on the infrastructure and network protocols and remote attacks on telecommunication services. The first advantage of vulnerabilities in network protocols and network infrastructure, and the second - the vulnerability of telecommunications services. In this case, a network infrastructure, we understand the existing system of organization of relations between objects and the network used in the network of service stations.

Top 5 most read

The basic rules of safe behavior on the Internet

Manager SAM and Active Directory

You forget your password. What should I do? Part 3

Social engineering as a way of committing crimes in the sphere of computer information

Идентификаторы защиты (SID)

Copyright © 2010 BRV ISTCOM S.R.L.- раскрутка сайта