TAILIEUCHUNG - Security & Monitoring

In recent years, it has been getting much easier for anyone with a portable laptop to acquire software that can capture data crossing data networks. Many vendors have created user-friendly (read easy-to-use) packet decoders that can be installed with minimal cost. These decoders were intended for troubleshooting purposes but can easily become tools for malicious intent. Packet snooping by using these decoding programs has another effect: The technique can be used in impersonation attacks, which are discussed in the next section | 6 Security Monitoring In a traditional wired network access control is very straightforward If a person has physical access to a computer or network hub they can use or abuse the network resources. While software mechanisms are an important component of network security limiting physical access to the network devices is the ultimate access control mechanism. Simply put if all terminals and network components are only accessible to trusted individuals the network can likely be trusted. The rules change significantly with wireless networks. While the apparent range of your access point may seem to be just a few hundred meters a user with a high gain antenna may be able to make use of the network from several blocks away. Should an unauthorized user be detected is impossible to simply trace the cable back to the user s location. Without transmitting a single packet a nefarious user can even log all network data to disk. This data can later be used to launch a more sophisticated attack against the network. Never assume that radio waves simply stop at the edge of your property line. It is usually unreasonable to completely trust all users of the network even on wired networks. Disgruntled employees uneducated network users and simple mistakes on the part of honest users can cause significant harm to network operations. As the network architect your goal is to facilitate private communication between legitimate users of the network. While a certain amount of access control and authentication is necessary in any network you have failed in your job if legitimate users find it difficult to use the network to communicate. There s an old saying that the only way to completely secure a computer is to unplug it lock it in a safe destroy the key and bury the whole thing in con 157 158 Chapter 6 Security Monitoring Crete. While such a system might be completely secure it is useless for communication. When you make security decisions for your network remember that above all else .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.