Preview

Protect Your Computer

Good Essays
Open Document
Open Document
1198 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Protect Your Computer
Hello my name isn Anifowose. Well, you will surely be reading mostly from this blog on how to prevent your pc from attacks and how to protect your data and valuable information from malicious attacks.
An attack is any attempt to expose, disable, steal, destroy or make an unauthorized use of an asset or gain unauthorized access.
Attack comes in different form, from friendly to serious. let me quickly mention popular types of attack we have around; Eavesdropping, Data Modification, Identity Spoofing (IP Address Spoofing), Password-Based Attacks, Denial-of-Service Attack, Man-in-the-Middle Attack, Sniffer Attack, Application-Layer Attack, Compromised-Key Attack. etc. individuals and companies around the globe have lost millions of dollars in terms of revenue by one form of attack or the other.let us take a look at this few mentioned one after another;
Eavesdropping
In general, the majority of network communications occur in an unsecured or "cleartext" format, which allows an attacker who has gained access to data paths in your network to "listen in" or interpret (read) the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise. Without strong encryption services that are based on cryptography, your data can be read by others as it traverses the network.
Data Modification
After an attacker has read your data, the next logical step is to alter it. An attacker can modify the data in the packet without the knowledge of the sender or receiver. Even if you do not require confidentiality for all communications, you do not want any of your messages to be modified in transit. For example, if you are exchanging purchase requisitions, you do not want the items, amounts, or billing information to be modified.
Identity Spoofing (IP Address Spoofing)
Most networks and operating

You May Also Find These Documents Helpful

  • Good Essays

    The following table presents the possible threats, the potential vulnerabilities each threat may exploit, and area of the system effected by the threats:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    1 What is brute force attack and how can the risks of these attacks be mitigated.…

    • 556 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Just never log on to your computer and never connect it to the internet. So while simple yes, you cannot do that as it would defeat the purpose of owning a PC or having a company with many of them. There are free programs out there that may help from your computer from being hacked. One program is the Microsoft baseline security analyzer (MBSA). Another program is Sysinternals, there are also some security programs build into the windows OS which are NetBIOS and TCP/UDP. A good practice to prevent hacking is to have multiple security programs working hand in hand with each other. Which in turn may make your computer possible harder to crack into and thus making a hacker possibly turn his attention elsewhere. Installing multiple firewalls around vulnerable programs also helps against being a soft target for hackers. Having to crack through or maneuver around them. You have to be continually testing your network and system to ensure that you have no cracks in your armor. Staying vigilante would be another good practice to partake in to help combat your computer being hacked into. You should always want to stay one step ahead of anyone trying to crack your…

    • 838 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Itp 1101 Research Paper

    • 2125 Words
    • 9 Pages

    "Denial-of-service" attacks are commonly characterized by an explicit attempt by hackers to prevent legitimate users of a service or resource from using them. It is also an effort to make one or more computer systems unavailable. It is typically targeted at web servers, but it can also be used on mail servers, name servers, and any other type of computer system. Denial of service (DoS) attacks may be started from a single machine, but they typically use many computers to carry out an attack. Since most servers have firewalls and other security software installed, it is easy to lock out individual systems. Therefore, distributed denial of service (DDoS) attacks are often used to coordinate multiple systems in a simultaneous attack. A distributed denial of service attack tells all coordinated systems to send a continuous stream of requests to a specific server all at the same time. These requests may be a simple ping or a more complex series of packets. If the server cannot respond to the large number of simultaneous requests, incoming requests will eventually become queued. This backlog of requests may result in a slow response time or a no response at all. When the server is unable to respond to legitimate requests, the denial of service attack has succeeded.…

    • 2125 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    IT 304

    • 16819 Words
    • 68 Pages

    on in the past. In the world of information technology, we’ve got attacks on all…

    • 16819 Words
    • 68 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    3. Attacks involving manipulating and tricking individuals into divulging confidential information, such as imposter emails…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    A hacker captures and retransmits authentication packets against the same server in order to gain interactive or session access to a system. This describes which type of attack?…

    • 16853 Words
    • 68 Pages
    Powerful Essays
  • Good Essays

    Cryptographic Attacks

    • 1743 Words
    • 7 Pages

    A known plaintext attack is an attack where a cryptanalyst has access to a plaintext and…

    • 1743 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Network Security

    • 637 Words
    • 3 Pages

    Some DoS attacks can be avoided by applying vendor patches to the software that has been compromised. Another way to deal with DoS attacks in the case of an attack coming from a number of known IP addresses is to put up a rule to drop all incoming traffic from those known attackers. Yet another way to deal with these types of attacks is to set up packet filters. This will act as a proxy for connections. Once the handshake is validated it will be forwarded to the correct destination instead of just forwarding the packet to the destination. TCP SYN flooding attack effects can be reduced or removed by limiting the number of TCP connections a system accepts and by shortening the amount of time a connection stays partially open. This is done by limiting the number of TCP connections made at the entry and exit points of the network structures. (Kaeo, 2004)…

    • 637 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Criminals continue to refine their methods with new ways to attract visitors to malicious sites. There are many types of antivirus and malware products available but none of them can fully protect your computer or a corporate network. It takes diligence to ensure the privacy of the information on your computer. While the antivirus and other software is necessary to try and avoid most problems it doesn’t completely solve the problem of those threats.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cognitive Hacking

    • 2741 Words
    • 11 Pages

    Autonomous attacks operate totally within the fabric of the computing and networking infrastructures. For example, the well-know unicode attack against older, unpatched versions of Microsoft 's Internet Information Server (IIS) can lead to root/administrator access. Once such access is obtained, any number of undesired activities by the attacker is possible. For example, files containing private information such as credit card numbers can be downloaded and used by an attacker. Such an attack does not require any intervention by users of the attacked system, hence we call it an "autonomous" attack.…

    • 2741 Words
    • 11 Pages
    Powerful Essays