Network Attack & Defense: Difference between revisions
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
1. introduction |
* 1. introduction |
||
2. network attacks |
* 2. network attacks |
||
- overview |
* - overview |
||
- port-scans |
**- port-scans |
||
- nessus |
**- nessus |
||
3. summary |
* 3. summary |
||
4. references |
* 4. references |
||
* IBM: increases of network attacks |
|||
number of the attacks on networks of state institutions between |
number of the attacks on networks of state institutions between |
||
july and august last yearly around 55 % risen |
july and august last yearly around 55 % risen |
||
* 80% of all network attacks are committed within the firewall |
|||
of protected range |
of protected range |
||
ComputerWorld, Januar 2002 |
ComputerWorld, Januar 2002 |
||
Line 24: | Line 24: | ||
* 1971 John Draper find out that a toy whistle from a Muesli box |
|||
reproduces exactly the clay/tone that a free voice grade |
reproduces exactly the clay/tone that a free voice grade |
||
channel opens |
channel opens |
||
* 1984 in the USA are discharged the Comprehensive Crime |
|||
control act, a law that more possibilities to the secret service |
control act, a law that more possibilities to the secret service |
||
gives to put to credit card cheats and hackers the handicraft |
gives to put to credit card cheats and hackers the handicraft |
||
* 1986 in the USA two further laws, which concern themselves |
|||
with attacks on computer systems, are adopted: The |
with attacks on computer systems, are adopted: The |
||
computer Fraud and electronics Communications Privacy act |
computer Fraud and electronics Communications Privacy act |
||
* 1988 Robert Morris bring 6.000 computers in the internet with |
|||
a virus to the crash and to a punishment of $10.000 are |
a virus to the crash and to a punishment of $10.000 are |
||
condemned |
condemned |
||
* 1994, summer Vladimir Levin, graduate of the pc. Petersburg |
|||
Universit, steal with a Russian group of hackers 10 millions $ |
Universit, steal with a Russian group of hackers 10 millions $ |
||
of the Citibank. He is arrested 1995 in London. |
of the Citibank. He is arrested 1995 in London. |
||
* 1998, 19 May members of the group of hackers of L0pht warn |
|||
of serious safety gaps. They maintain the internet in a half |
of serious safety gaps. They maintain the internet in a half |
||
hour to paralyze to be able. |
hour to paralyze to be able. |
Revision as of 13:30, 28 January 2005
network attack & defenseBold
- 1. introduction
- 2. network attacks
- - overview
- - port-scans
- - nessus
- 3. summary
- 4. references
- IBM: increases of network attacks
number of the attacks on networks of state institutions between july and august last yearly around 55 % risen
- 80% of all network attacks are committed within the firewall
of protected range ComputerWorld, Januar 2002
historical outline
- 1971 John Draper find out that a toy whistle from a Muesli box
reproduces exactly the clay/tone that a free voice grade channel opens
- 1984 in the USA are discharged the Comprehensive Crime
control act, a law that more possibilities to the secret service gives to put to credit card cheats and hackers the handicraft
- 1986 in the USA two further laws, which concern themselves
with attacks on computer systems, are adopted: The computer Fraud and electronics Communications Privacy act
- 1988 Robert Morris bring 6.000 computers in the internet with
a virus to the crash and to a punishment of $10.000 are condemned
- 1994, summer Vladimir Levin, graduate of the pc. Petersburg
Universit, steal with a Russian group of hackers 10 millions $ of the Citibank. He is arrested 1995 in London.
- 1998, 19 May members of the group of hackers of L0pht warn
of serious safety gaps. They maintain the internet in a half hour to paralyze to be able.