Wednesday, June 15, 2011

HACKER ATTACKS ON UNDERSTANDING COMPUTER SYSTEM


Various attacks can happen to your computer system which in lalukan by hackers are as follows:
1. Non-Technical Attacks
Exploitation involving the manipulation of people or users are the biggest vulnerability in a computer or network infrastructure.Exploitation of this species classified in the exploitation of which is social engineering. Social engineering is defined as the exploitation of human beliefs in order to obtain information that is not good. While the other attacks related to information systems is physical, where hackers will break through the buildings, computer rooms and other areas that contain critical information or property. This attack is referred to as physical attacks. Physical attacks can include dumpster diving.
2. Network Infrastructure Attacks

           
Attacking network infrastructure is very easy, because many networks can be seen from anywhere in the world through the internet. Here are some examples of attacks against network infrastructure: 1. Connected to a network through a model that plugs into a computer and through a firewall. 2. Exploit the weaknesses of network transport mechanisms such as TCP / IP and NetBIOS. 3. Flooding the network with a lot of demand, create a denial of service (DoS) for legitimate requests. 4. Installing a network analysis tool in the network and take every packet that passes through and remove confidential information. 5. Go to a network via an insecure wireless Configuration is 802.11b.
3. Operating System Attacks
Attacking the operating system more in love by hackers. The operating system consists of many parts that are easy to attack because every computer has a gap that can be used and exploited. Hackers prefer to attack Windows and Linux operating systems because of the people using these operating systems and know a lot about this operating system vulnerabilities. Some examples of attacks on operating systems is as follows: 1. Exploit application-specific protocol 2. Attacking authentication system 3. Through the file system security. 4. Crack passwords and encryption mechanisms.
4. Application Attacks
           
Programs such as e-mail server software and web applications are often targeted by hackers. Some examples are as follows: 1. Applications Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) is often attacked because most firewalls and other security mechanisms dikonfogurasikan to allow full access to the program - a program from the internet. 2. Malicious software (malware) consists of viruses, worms, Trojan horse, and spyware. Malware can create a network and systems to be down. 3. Spam (junk e-mail) to bring a bad effect on the system and place pentimpanan. Spam also carry malware. 

0 comments:

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More