Protect Your Computer

Topics: Authentication, IP address, Authorization Pages: 4 (1198 words) Published: October 11, 2012
Hello my name isn Anifowose. Well, you will surely be reading mostly from this blog on how to prevent your pc from attacks and how to protect your data and valuable information from malicious attacks. An attack is any attempt to expose, disable, steal, destroy or make an unauthorized use of an asset or gain unauthorized access. Attack comes in different form, from friendly to serious. let me quickly mention popular types of attack we have around; Eavesdropping, Data Modification, Identity Spoofing (IP Address Spoofing), Password-Based Attacks, Denial-of-Service Attack, Man-in-the-Middle Attack, Sniffer Attack, Application-Layer Attack, Compromised-Key Attack. etc. individuals and companies around the globe have lost millions of dollars in terms of revenue by one form of attack or the other.let us take a look at this few mentioned one after another; Eavesdropping

In general, the majority of network communications occur in an unsecured or "cleartext" format, which allows an attacker who has gained access to data paths in your network to "listen in" or interpret (read) the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise. Without strong encryption services that are based on cryptography, your data can be read by others as it traverses the network. Data Modification

After an attacker has read your data, the next logical step is to alter it. An attacker can modify the data in the packet without the knowledge of the sender or receiver. Even if you do not require confidentiality for all communications, you do not want any of your messages to be modified in transit. For example, if you are exchanging purchase requisitions, you do not want the items, amounts, or billing information to be modified. Identity Spoofing (IP Address Spoofing)

Most networks and operating systems...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • computer Essay
  • computer Essay
  • Computer Essay
  • computer Essay
  • Turn Off Your Computer Essay
  • Build Your Own Computer Essay
  • Computers Essay
  • Build your first Computer Essay

Become a StudyMode Member

Sign Up - It's Free