Difference between revisions of "Network Attack & Defense"

From
Jump to navigation Jump to search
Line 1: Line 1:
##network attack & defense##
+
==network attack & defense==
 
   
 
* introduction
 
* introduction
Line 11: Line 10:
   
   
  +
==introduction==
 
* IBM: increases of network attacks
 
* IBM: increases of network attacks
 
number of the attacks on networks of state institutions between
 
number of the attacks on networks of state institutions between
Line 17: Line 17:
 
of protected range
 
of protected range
 
ComputerWorld, Januar 2002
 
ComputerWorld, Januar 2002
 
 
   
 
'''historical outline'''
 
'''historical outline'''
 
 
   
 
* 1971 John Draper find out that a toy whistle from a Muesli box
 
* 1971 John Draper find out that a toy whistle from a Muesli box
Line 42: Line 38:
 
of serious safety gaps. They maintain the internet in a half
 
of serious safety gaps. They maintain the internet in a half
 
hour to paralyze to be able.
 
hour to paralyze to be able.
  +
  +
  +
==network attacks==
  +
  +
'''overview'''
  +
  +
'''port-scans'''
  +
  +
'''nessus'''
  +
  +
  +
==summary==
  +
  +
  +
==references==

Revision as of 15:34, 28 January 2005

network attack & defense

  • introduction
  • network attacks
    • overview
    • port-scans
    • nessus
  • summary
  • references


introduction

  • IBM: increases of network attacks

number of the attacks on networks of state institutions between july and august last yearly around 55 % risen

  • 80% of all network attacks are committed within the firewall

of protected range ComputerWorld, Januar 2002

historical outline

  • 1971 John Draper find out that a toy whistle from a Muesli box

reproduces exactly the clay/tone that a free voice grade channel opens

  • 1984 in the USA are discharged the Comprehensive Crime

control act, a law that more possibilities to the secret service gives to put to credit card cheats and hackers the handicraft

  • 1986 in the USA two further laws, which concern themselves

with attacks on computer systems, are adopted: The computer Fraud and electronics Communications Privacy act

  • 1988 Robert Morris bring 6.000 computers in the internet with

a virus to the crash and to a punishment of $10.000 are condemned

  • 1994, summer Vladimir Levin, graduate of the pc. Petersburg

Universit, steal with a Russian group of hackers 10 millions $ of the Citibank. He is arrested 1995 in London.

  • 1998, 19 May members of the group of hackers of L0pht warn

of serious safety gaps. They maintain the internet in a half hour to paralyze to be able.


network attacks

overview

port-scans

nessus


summary

references