jaden terry. to obtain privacy and protect data from other people. o businesses customer/employee...
TRANSCRIPT
To obtain privacy and protect data from other people. o Businesses
• Customer/Employee information• Credit card numbers• To gain a competitive advantage
o Government• Protect information from other countries• Protect classified information.
o Personal• Privacy
To prevent hackerso Viruses, malware etc.o Could potentially shut down computers or networks.
September 2012 bankso Shut down websites for many well known banks by
sending outrageous amounts of data to the websites. Sony PlayStation network
o Stealing account information and credit card numbers from about 77 million users.
o Shut down the PlayStation network for about 2 weeks. RAT (Remote Access Tool)
o Stealing government information
Passive Wiretapping
o Device that plugs into the network and allows someone to listen or see the network traffic.
o Another device allows them to read encrypted data.
Port Scanningo Identifies open ports on
a computer to see if they are accessible.
Active Spoofing
o Impersonating or concealing the IP address of another computer.
Denial of Serviceo Making a computer or
network unavailable. Buffer Overflow
o When the buffer is overrun with data, the extra data can be sent elsewhere.
Firewall – system that controls the incoming and outgoing traffic and determines whether or not packets should be allowed through.o Network layer: Packet filters that allow packets to pass
through if they match a certain rule set. Mac Address Filtering – Security method where MAC
addresses are used to determine if the network is accessible.o MAC addresses can be spoofed.
WPA/WPA2 (Wireless Protected Access) – Encrypts packets.o WPA2 uses AES (Advanced Encryption Standard)
protocol for encrypting packets.