This website uses cookies to ensure you have the best experience. Learn more

Case2 Essay

2011 words - 9 pages

Attackers use various hacking techniques to compromise a website or a computer. The most common ones are Trojan horse programs, Denial of Service, unprotected windows shares, mobile code, cross-site scripting and packet sniffing. This paper will discuss in details how attackers use these hacking techniques to compromise a system, how attackers gather information from a victim via their e-mail communication and how to prevent the attacks.
Trojan horse programs are a common way for intruders to trick a user into installing back door programs. According to Armor2net, these programs can allow intruders easy access to a computer without the user's knowledge, change the system configurations, or infect the computer with a computer virus. These back door or remote administration programs are also known as social engineering. In fact, hackers usually use BackOrifice, Netbus, and SubSeven to gain remote access to users' computers. Once installed, these programs will allow them to access and control the computers.
Denial of Service (DoS) is another technique that hackers frequently use. DoS attack causes user's computer to crash or to become so busy processing data that the computer is unable to use it. According to Armor2net, it is important to note that in addition to being the target of a DoS attack, it is possible that the attackers also us the computer to participate in another DoS attack on another system. In fact, this technique is called Distributed Denial-of-Service (DDoS) attack. The attackers install a back door program that runs on the compromised computer and wait for further instructions. When a number of back doors are running on different computers, a single "handler" can instruct all of these back doors to launch a DoS attack to another system. As a result, the end target of the attack is not the first comprised computer, but another website or system that uses the compromised ones for a larger attack.
It is easy for hackers to gain access to unprotected Windows networking shares. Attackers used automated technique to place tools on large numbers of Windows-based computers attached to the Internet. This will cause a compromised computer not only creates problems for the computer's owner, but it is also a threat to other sites on the Internet. The greater immediate risk to the Internet community is the potentially large number of computers attached to the Internet with unprotected Windows networking shares combined with distributed attack tools.
Another threat includes malicious and destructive code, such as viruses or worms, which leverage unprotected Windows networking shares to propagate. There is great potential for the emergence of other intruder tools that leverage unprotected Windows networking shares on a widespread basis. According to Combo Fix, there have been reports of problems with mobile code such as Java, JavaScript and ActiveX, which are programming languages that let web developers use to develop web browsers. Although the...

Find Another Essay On case2

Travel, Tourism and Hospitality Human Resources

2823 words - 11 pages right people to meet the company's needs but also offer appropriate reward structures and the opportunity for employee participation.CONTENTSectionPage NumberIntroductionI.Recruitment1.Determining the work requirements2.Application screening3.Interview4.Assessment of shortlisted candidatesII.InductionIII.Training and DevelopmentIV.Termination Process1.Carol Storey case2.Mark Anderson caseV.Reward Strategy1.Definition and description of "reward

formula Essay

8060 words - 32 pages total number of ways of performing the two tasks, you have to MULTIPLY the individual number of ways. When only one of the two tasks is performed, i.e. the tasks are connected by an 'OR', to find the total number of ways of performing the two tasks you have to ADD the individual number of ways. Eg: In a shop there are'd' doors and 'w' windows. Case1: If a thief wants to enter via a door or window, he can do it in - (d+w) ways. Case2: If a thief

When the Bubble Burst

1539 words - 6 pages By the time I arrived state side from my second tour in the Middle East the housing bubble had already burst. I noticed a drastic change in the way that many of my friends and family were living. Several of my friends that worked in real estate had sold their boats and seconds houses. My own stock portfolio had lost a third of its value. My sister and her husband had defaulted on their home mortgage leaving them scrambling for a place to live. I

phase diagram

4456 words - 18 pages Introduction: Chemical equilibrium is a crucial topic in Chemistry. To represent and model equilibrium, the thermodynamic concept of Free energy is usually used. For a multi-component system the Gibbs free energy is a function of Pressure, Temperature and quantity (mass, moles) of each component. If one of these parameters is changed, a state change to a more energetically favorable state will occur. This state has the lowest free energy

Revolutionary Work of Art

1890 words - 8 pages Walter Benjamin emphasizes in his essay, “The Work of Art in the Age of its Technological Reproducibility” that technology used to make an artwork has changed the way it was received, and its “aura”. Aura represents the originality and authenticity of a work of art that has not been reproduced. The Sistine Chapel in the Vatican is an example of a work that has been and truly a beacon of art. It has brought a benefit and enlightenment to the art

Enlightenment Thought in New Zealand Schools

1594 words - 6 pages In this essay I will be looking at how the political and intellectual ideas of the enlightenment have shaped New Zealand Education. I will also be discussing the perennial tension of local control versus central control of education, and how this has been affected by the political and intellectual ideas of the enlightenment. The enlightenment was an intellectual movement, which beginnings of were marked by the Glorious Revolution in Britain

Psychological Egoism Theory

2240 words - 9 pages The theory of psychological egoism is indeed plausible. The meaning of plausible in the context of this paper refers to the validity or the conceivability of the theory in question, to explain the nature and motivation of human behavior (Hinman, 2007). Human actions are motivated by the satisfaction obtained after completing a task that they are involved in. For example, Mother Teresa was satisfied by her benevolent actions and

How Celtic Folkore has Influenced My Family

1587 words - 6 pages Every family has a unique background that influences the way they live and interact with other people. My parents, who emigrated from Ireland to the States with my three brothers in 1989, brought over their own Celtic folklore and traditions that have helped shaped the way our family operates and lives. One aspect of folklore that has helped shape my family dynamic is the Celtic cross—both its background and what role it has played in our lives

Julia Margaret Cameron

1406 words - 6 pages At a time when women were looked upon as being homemakers, wives, mothers and such the late 1850's presented a change in pace for one woman in specific. Photography was discovered in 1826 and soon after the phenomenon of photography was being experimented with and in turn brought new and different ways of photo taking not only as documenting real time, but also conceptualizing a scene in which an image would be taken. Julia Margaret Cameron will

Evaluation of School Improvement

1403 words - 6 pages The evaluation process should be progressive to incorporate overall planning, implement changes, which contribute to success. In order to focus on school climate and norms, the evaluation design must include the students, instructions, and outcomes to improve communication and building-level concerns to be address in this response. School Climate and Social Norms The school principal, other staff leaders, and personnel set the tone and the

Case Study: The Benefits of Animal Testing

1757 words - 7 pages Nine year old Amy has already had a rough start in life. She was born with an abnormal heart that hinders her everyday activities. Amy is unable to keep up with kids her own age because she often tires out easily. As a consequence, she has very little friends and is often alone. Amy is forced to take different medications everyday just to survive. Amy’s life consists of medicine, doctors, and constant hospital visits. However, Amy is due for a

Similar Essays

Australia Should Become A Republic Persuasive Argument With Pros And Cons

818 words - 3 pages democracy works. Federation has its ups and downs and people change their minds. A poll held two years ago shows that 30% of people voted for the Queen to remain head of the state. This shows that more and more Australians believe that we should become a republic. I think that this is the way to go. Its time for a revolution!Bibliography:http://www.actnow.com.au/Issues/Australian_republic_debate.aspxhttp://my.integritynet.com.au/purdic/vivalarepublic.htmhttp://home.alphalink.com.au/~eureka/case2.htmhttp://en.wikipedia.org/wiki/Australian_republicanismhttp://www.republic.org.au/homepagehtml.htmhttp://www.norepublic.com.au/

Why Are Many Young Americans So Uncomfortable With Liberal Arts?

1128 words - 5 pages ethics equally, Ungar leaves no doubt that liberal arts is an education that should not be sought after. Works Cited http://www.cic.edu/News-and-Publications/Multimedia-Library/CICConferencePresentations/2011%20Presidents%20Institute/make-the-case2.pdf

Court Paper Operation Of Canadian Court Systems

1706 words - 7 pages of the Case2/27. Accurate Identification of the Next Stage the Case would Progress To2/28. Your Impressions of the Court Operation2/29. Your Recommendations to Improve Operation2/210. Appearance and Organization of Paper2/2TOTAL19/20Well Done!

International Copyright Circumvention Essay

2315 words - 9 pages International Copyright Circumvention A little under three years ago, I heard about a case where a programmer had been arrested for a program that bypassed the copy protection mechanisms in one of Adobe's products1. People who have published information on or performed security circumvention in the past, even when done in a non-destructive manner have faced some legal problems. Specifically, it reminded by of the Kevin Mitnick case2 a few