Spyware is almost exactly as it sounds, a spying program. This type of malware will record the users input and transmit it back to the hacker to access at his leisure. This type of spyware is called a key logger and can capture interesting information such as user names, passwords, credit card numbers and email addresses. The more advanced versions of spyware can siphon off network data that will allow the hacker access to files, encryption keys, and other sensitive information. The final malware I will cover is the zombie.
5. What does the Skipfish application do and why is it a good security tool for web servers and web application testing? Skipfish application is an open source web app and a fully automated security reconnaissance tool. It is a good security tool because it can perform security and vulnerability tests. 6.
Understanding these threats allows the organisation to prevent, protect and correct any damage done to his/her computer to an extent. This can help to reduce the negative impacts it may have on an organisation. Threats: Below is a list of threats to IT systems, ways to keep the system and data secure and organisational issues affecting the security of IT systems. 1. Malicious damage: Examples can be Viruses, Worms or Trojans a.
A forgotten detail can provide a convenient back door, while an overlooked port can be an attacker's front door. Neglected user accounts can permit an attacker to slip by the defenses unnoticed. Part of the challenge of securing a Web server is recognizing the goal. As soon as we know what a secure Web server is, we can learn how to apply the configuration settings to create one. The fact that an attacker can strike remotely makes a Web server an appealing target.
How can this information be used to attack the targeted website? IT DISPLAYS THE ROUTERS ON A PATH THROUGH THE INTERNET TO GET TO A SPECIFIC DESTINATION – IT DISPLAYS THE IP ADDRESS FOR A NIC AND THE PORTS THAT ARE ACTIVE – KNOWING THE OPEN PORTS GIVES AN ADVANTAGE TO AN ATTACKER 4 Is Sam Spade an intrusive tool? What is your perspective on the use of a freeware utility such as Sam Spade? IT IS NOT AN INTRUSIVE TOOL – IT IS A SECURITY TOOL THAT IS FREE SO IT SEEMS TO BE A GOOD THING 5 By its nature, WHOIS information must be publicly available. What do you think companies and organizations should do with regard to this information?
Many attackers follow a general set of steps in order to gain the permissions necessary to break into a system. The first steps that attackers take is information gathering which gives them an idea about many facets of the system. The facets could include vulnerabilities (such as open ports or an exploit in an old piece of software),
To begin with, the definition of a port scan is, “The examination of TCP and UDP ports to determine which are open and what services are running. (Conklin 659) “The method used by intruders to discover the services running on the target machine. The intruder can then plan an attack on any vulnerable service that he or she finds for example, if the intruder finds that port 143 is open here she may proceed to find out what version of IMAP is running on the target machine if the version is vulnerable she may be able to gain superuser access to the machine using exploit (a program that exploits a security hole).” (Teo, 2000) To put the definition of the port scan into simpler terms it is a way for intruders to scan the network of the company for a way into the company records and programs. A port scan can tell an intruder what port is open, where it leads to, and what programs, files, passwords are on the machine that they have found access. Ping sweeps are used to identify the path a host ID uses in a given subnet.
Malicious Code Protection Implement and enforce a malicious code protection program designed to minimize the risk of introducing malicious code (e.g., viruses, worms, Trojan horses) into all systems and networks. Peer-to-Peer
Permissions are based on what the user or group is allowed to do with the data that they have accessed. This includes the ability to alter, add, or delete data. Usernames, passwords, and encryption keys will be used to limit access to the network and to help the IT team keep track of who has used the network and when. This will help reduce the risk of unauthorized access. Gaining access to the network will be done using IPv4 and Mobile IPv4 (MIPv4) protocols.
It will inform you on how hackers and system administrators used ping sweeps and port scans. While describing some of these notorious computer activities, these techniques will also be shown how system administrators can use to benefit the company. Two techniques that are used to attack a network is ping sweep and port scans. These activities can be used with malicious intent against, as well as, in effort to try to protect a network. Ping sweeps and port scans has been a notorious and yet a useful tool for hackers and system administrators.