- It is a kind of IP address forgery technique, via this gain unauthorized access to Computers. Also called Host file hijack.
- Another definition, purpose of distributing secret data, Computer networks are illegally used via this technique.
- Computer networks are prone to criminal invasion, and there are several popular and ingenious techniques used for abusing network technology. Two such abuses are IP Spoofing & tapping.
- IP or Internet Protocol is a world standard set of Network management rules and regulations and IP address identifies every Computer facility in the N/W.
- In IP Spoofing, What the abuser does is attack another Computer by 'spoofing' the electronic identity (IP Address) of a trusted machine in order to mask his own true IP address. So, the attacker's true identity is concealed and his activity appears to originate from the spoofed machine.
- In tapping, the abuser gains illegal access to a Computer System by tapping somebody else's existing login session on the Computer System.Once the official User open a login session on to a remote Computer System after giving the authentication(User name, Password, Mobile number, etc) data , the attacker too would be able to use this open path to gain another login session or get into same remote Computer System, bypassing all authentication requirement.
- Another incident of network related cyber crime is denial of service (DoS) attack, which is an incident in which a User or Organization is deprived of the services of one or more Computer resources they would normally expect to have. The most common kind of DoS, Attack is simply to send more traffic to a website than the website administrator anticipated someone might send.
- In many cases, DoS attacks have forced Web sites, accessed by millions of People, to temporarily cease operation.
- Apart from illegally creating several millions of 'visits' to a Website in few seconds , these sorts of attacks also include sending oversized Internet Control Message Protocol (ICMP) packets, sending a message with oversized "From" address etc. A DoS attack can cost the target Person or Company a great deal of time and money.
- A DoS attack can also be launched to destroy programs and other files in the target computer systems.
- Protecting the Website with state of the art Firewall S/W is the only solution to avoid such attacks.
Unless and until Our society recognizes cyber bullying for what it is,the suffering of thousands of silent victims will continue. MUSKAN
--MJN Corp..
Comments
Post a Comment