joi, 11 aprilie 2013

Telecom IP network against "hackers" strategy analysis-IEEE, Network Security, Routers - H - Business

(1069, 'This paper Telecommunications IP network characteristics of a hacker attack on the telecommunication IP network security threats introduction of the IP telecom network hacking methods and preventive measures discussed how to set up telecom IP network against hacker attacks the security policy br br 1 Introduction Telecommunications network from the original telephone exchange based voice services are full to the voice data multimedia and other integrated services platform for change IP technology as the key to next generation telecommunications network technology the traditional telecommunications network because of its closeness security is not very prominent but the agreement with IP based next generation network must face the past has begun only in the IP Internet until appears Network Security Problem China Telecom IP network at the threat of many factors hacking is one of the most important kind in the Chinese telecom IP network there had been cases of hackers such as the recent adoption of a corporate employee participation in a Mobile Company project was the system password and then penetrated Mobile top up a central database stealing prepaid card code to move the company a loss of 370 million yuan br br Recent years the hacker attacks on the telecommunications network has brought about great damage hacker attacks with the continuous development of technology network and system vulnerabilities continue to appear hacker groups change social network dependent increase in the future more and more hacking tools hidden destructive power will be more and more attacks will become more complex and difficult to prevent 2006 World Telecommunication Day The theme is to make the world more secure network According to China 39 s Ministry of Information Industry is also the theme of a series of thematic activities which can be seen telecom network security has become an important issue in development In this paper hacking tools and strategie s to prevent simple analysis given br br 2 hackers on the IP telecom network security threat analysis br The quot PRC Telecommunications Regulations quot on the telecom network security more harmful for the real computer viruses hackers etc made provisions prohibited Which in the 58th article of any organization or individual shall have four categories of harm network security and information security telecommunications act which is intentionally in the third category Make Reproduce spreading computer viruses or otherwise assault telecommunications networks telecommunications facilities This mainly refers to other act now hacking Hackers worldwide IP network intrusion Communicate Systems interception of communications security information they distort information replace page download or steal sensitive information host and network attacks sending mail bombs or to networks Hacker attack if successful a small network of services is paralyzed big is not restored within a short time caused the paralysis of the entire network causing huge losses Hackers have been able to pose a threat to telecom IP network mainly the following reasons br br 1 technology IP protocol for errors and omissions making network deficiencies provided the conditions for the hackers For example IEEE 802 11b WEP vulnerabilities appear there are as TCP IP protocol the lack of appropriate security mechanisms and IP networks were originally designed without considering basic security issues and so have made telecommunications networks are crippled With the growing size of software systems systems software application software become more complex telecommunication equipment manufacturers integrators and operators of software center in the development and implementation process would inevitably give rise to various defects and vulnerabilities hackers could exploit these vulnerabilities to attack the telecom IP network br br 2 management lack of complete and unified security policy the lack of sound practical management and technical specifications for hackers quot advantage of the loopholes quot facilitated Many networks in the early construction the direction of development tend to the convenience and practicality of the network ignoring the critical network security for the future development conceals potential problems Some places the lack of rational planning and design of secure network configuration firewall configuration is also not tight these are provided for the convenience of hacker attacks br br 3 Human aspects the lack of network security professionals and the operation and maintenance staff security awareness security level there are very different some hackers actually can pass as manager by calling the Question to the network password these have become telecom IP network hacking tools the operation and maintenance personnel to improve the safety level and safety awareness on the various operators is an urgent matter br br 3 Telecom IP network hacking tools and preventive measures br Results are in accordance with hacking tools can be divided into two categories local attacks and remote attacks according to the depth of invasion can be broadly divided into surface attack read access write and implement non radical visit Radical Write and implementation of access in accordance with the system the degree of attack can be divided into six levels first level is the e mail bomb attacks and denial of service attack the second layer is a local user access to unauthorized read access the third layer is the local user access to non write access authorization the fourth layer is the remote user access to non authorized user accounts and remote access to files read access the fifth layer is the remote user is licensed to write the file permissions the sixth layer is the remote user access to root privileges Several categories of relationship shown in Figure 1 br br Figure 1 hacking telecom IP network means the relat ionship between several categories br Common hacker attacks means of telecommunication IP network are password cracking etc decoding type attacks malicious code attacks backdoor attacks denial of service type attacks mail bomb bomb attacks on class mailing list through IP attack packets the telecommunications network through the operating system vulnerabilities to attack buffer overflow and remote buffer overflow attacks network service exploits and so on Here are several common hacking tools for analysis br br 3 1 decoding type attacks such as password cracking br br Password hacker attack is one of the most common attack methods Hackers crack through password cracking software Server Account password as administrators do safety awareness is not strong which makes the method simple and effective For password cracking attacks set the password should be careful not to use too simple not to use the different accounts the same password should keep your password secure passwords and frequently changing laws make all your passwords from time to time are replaced once timely cancellation or stop work out of job')



access point vs router

Niciun comentariu:

Trimiteți un comentariu