Skip to main content

Posts

Showing posts from June, 2016

Types of Attacks

Types of Attacks:-     We shall classify attacks with respect to two views: the common person’s view and a technologist’s vies. 1      Attacks: A General View                                             From a common person’s point of view, we can classify attacks into three categories, as shown below. Criminal Attacks    criminal attacks are the simplest to understand. Here, the sole aim of the attackers is to maximize financial gain by attacking computer systems. The lists some forms of criminal attacks. Attack Description Fraud     Scams             Destruction           Identity thef...

Firewall

Firewalls:- .1 Introduction:-      The dramatic rise and progress of the Internet has opened possibilities that no one would have thought of. We can connect any computer in the world to any other computer, no matter how far the two are located form each other. This is undoubtedly a great advantage for individuals and corporate as well. However, this can be a nightmare for network support staff, which is left with a very difficult job of trying to protect the corporate network from a variety of network. At a broad level, there are two kinds of attacks: ·          Most corporations have large amounts of valuable and confidential data in their networks. Leaking of this critical information to competitors can be a great setback. ·          Apart from the danger of the insider information leaking out, there is a great danger of the outside elements (such as viruses and wor...