- Practical Network Scanning
- Ajay Singh Chauhan
- 626字
- 2022-07-12 10:43:00
Why security?
As the internet grows and technology evolves for modern computer networks, network security has become one of the most crucial factors for everyone. This includes everyone from end users and small and medium-sized businesses (SMBs) to cloud service providers.
Due to a growing volume of network attacks, network security should be a priority when designing network architecture. To understand the importance of this, imagine what could happen if there was a network integrity breach at a bank, stock exchange, or other financial database.
The importance of network security is not just limited to the IT industry. It is also important within industries such as health care. Health records contain some of the most valuable information available, including Social Security numbers, home addresses, and patient health histories. If this data is accessed by unauthorized persons, it can be stolen or sold to the black market.
Security awareness is important for everybody and not just the IT department. If you work with internet enabled devices, it's your responsibility too. However, you can only control information security once you know how to secure it.
No one can get into your system until something is compromised. Similarly, if your door is locked from the outside, nobody can enter your house unless they gain access to a duplicate key or have a similar key built by getting physical access to the lock. A few examples of how a system might be compromised are as follows:
- A targeted email could be sent to random users with an attachment (Drive by Download). If a user opened that attachment, their system would be compromised.
- An email is received which poses as a domain such as banking and asks you to change your password through a provided link. Once you do this, your username and password can be stolen.
- If a small typo is made when typing a website address into a browser, a similar page may open (Phishing) which is not genuine, and your credentials can be stolen.
- Features provided by websites for resetting forgotten passwords can also be very risky. Let's say somebody knows my email ID and attempts to access my account by selecting a forgotten password option. If the security question asks for my date of birth, this can easily be found on my resume.
- A password for an Excel file can easily be broken by a brute-force attack.
- The most widespread types of ransomware encrypt all or some of the data on your PC, and then ask for a large payment (the ransom) in order to restore access to your data.
- During DNS hijacking, an online attacker will override your computer's TCP/IP settings so that the DNS translation gets altered. For example, typing in abc.com will translate it into this IP: 140.166.226.26. However, a DNS hijacker will alter the translation so that abc.com will now send you the IP address of a different website.
- Denial of Service network attacks disrupt the normal volume of traffic sent to targeted services with excessive amounts of traffic. This can be damaging in various ways. One example could be if a company has a Friday sale, and a competitor launches an attack on them in order to shut their services down and consequently increase their own sales.
According to research by British insurance company Lloyd's, the damage from hacks cost businesses $400 billion a year.
To further explore the cost of cybercrimes, visit the following webpage: https://www.forbes.com/sites/stevemorgan/2016/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#612db25c3a91.
The market research firm Gartner estimates that global spending on cybersecurity is somewhere around $96 billion in 2018. By 2020, companies around the world are expected to spend around $170 billion—a growth rate of nearly ten percent in the next five years.
- 計算機網絡安全技術(第6版·慕課版)
- API安全實戰
- Kali Linux CTF Blueprints
- API攻防:Web API安全指南
- Testing and Securing Android Studio Applications
- 可信計算3.0工程初步(第二版)
- 隱私計算
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 華為防火墻實戰指南
- 網絡服務安全與監控
- 白話零信任
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)
- 網絡入侵檢測系統原理與應用
- 黑客攻防從入門到精通:實戰篇(第2版)
- 互聯網域名國際化與安全技術導論