PASSIVE AND ACTIVE THREAT
About network security
Network security consists of the
provisions and policies adopted by a network administrator to prevent and
monitor unauthorized access, misuse, modification, or denial of a computer
network and network-accessible resources. Network security involves the
authorization of access to data in a network, which is controlled by the
network administrator. Users choose or are assigned an ID and password or other
authenticating information that allows them access to information and programs
within their authority.
Network security covers a variety of computer networks,
both public and private, that are used in everyday jobs conducting transactions
and communications among businesses, government agencies and individuals.
Networks can be private, such as within a company, and others which might be
open to public access. Network security is involved in organizations,
enterprises, and other types of institutions. It does as its title explains: It
secures the network, as well as protecting and overseeing operations being
done. The most common and simple way of protecting a network resource is by
assigning it a unique name and a corresponding password.
Network security is becoming a very
important issue and continues to grow. Some cases involving system security is
now a claim that requires handling and protection costs so much. System - vital
systems like defense systems, systems and banking systems-level systems, it
requires such a high level of security. This is mainly due to advances in
computer networks with the concept of open system so that anyone, anywhere and
at any time, have the opportunity to access these vital areas.
Network security is defined as a
protection from power resources to efforts disclosure, modification,
utilization, prohibition and destruction by unauthorized persons.
Network security concepts
Network security starts with
authenticating, commonly with a username and a password. Since this requires
just one detail authenticating the user name —i.e. the password— this is
sometimes termed one-factor authentication. With two-factor authentication,
something the user 'has' is also used (e.g. a security token or 'dongle', an
ATM card, or a mobile phone); and with three-factor authentication, something
the user 'is' is also used (e.g. a fingerprint or retinal scan).
Once
authenticated, a firewall enforces access policies such as what services are
allowed to be accessed by the network users. Though effective to prevent
unauthorized access, this component may fail to check potentially harmful content
such as computer worms or Trojans being transmitted over the network.
Anti-virus software or an intrusion prevention system (IPS)[3] help detect and
inhibit the action of such malware. An anomaly-based intrusion detection system
may also monitor the network like wireshark traffic and may be logged for audit
purposes and for later high-level analysis.
Communication
between two hosts using a network may be encrypted to maintain privacy.
Honeypots,
essentially decoy network-accessible resources, may be deployed in a network as
surveillance and early-warning tools, as the honeypots are not normally
accessed for legitimate purposes. Techniques used by the attackers that attempt
to compromise these decoy resources are studied during and after an attack to keep
an eye on new exploitation techniques. Such analysis may be used to further
tighten security of the actual network being protected by the honeypot.A
honeypot can also direct an attacker ’ s attention away from legitimate
servers. A honeypot encourages attackers to spend their time and energy on the
decoy server while distracting their attention from the data on the real
server. Similar to a honeypot, a honeynet is a network set up with intentional
vulnerabilities. Its purpose is also to invite attacks so that the attacker ’ s
methods can be studied and that information can be used to increase network
security. A honeynet typically contains one or more honeypots.
Definition of threat
A threat is an act of coercion wherein
an act is proposed to elicit a negative response. It is a communicated intent
to inflict harm or loss on another person. It can be a crime in many
jurisdictions. Threat (intimidation) is widely seen in animals, particularly in
a ritualized form, chiefly in order to avoid the unnecessary physical violence
that can lead to physical damage or death of both conflicting parties.
Categories of threat are
There
are two categories of threat are:
PASSIVE
THREAT
Threat
or passive monitoring and recording data during the data recording ditranmisikan
passing through the data during the data communication facilities
ditranmisikan. The purpose of the attacker is to obtain information that is
being transmitted.
Passive
threats include:
- System
failures
Failure
causes are defects in design, process, quality, or part application, which are
the underlying cause of a failure or which initiate a process which leads to
failure. Where failure depends on the user of the product or process, then
human error must be considered.
·
Can be a electrical interference
Electromagnetic
interference (or EMI, also called radio-frequency interference or RFI when in
radio frequency) is disturbance that affects an electrical circuit due to
either electromagnetic induction or electromagnetic radiation emitted from an
external source The disturbance may interrupt, obstruct, or otherwise degrade
or limit the effective performance of the circuit. These effects can range from
a simple degradation of data to a total loss of data.[2] The source may be any
object, artificial or natural, that carries rapidly changing electrical
currents, such as an electrical circuit, the Sun or the Northern Lights.
EMI
can be intentionally used for radio jamming, as in some forms of electronic
warfare, or can occur unintentionally, as a result of spurious emissions for
example through intermodulation products, and the like. It frequently affects
the reception of AM radio in urban areas. It can also affect cell phone, FM
radio and television reception, although to a lesser extent.
·
Can be a Equipment Failure
An
equipment failure involving components of a computer or a device other than a
computer. Sometimes a piece of equipment fails to produce a release, and
sometimes the equipment itself fails to function properly resulting in a
release. In both cases, the failure is identified as an "Equipment
Failure".
·
Can be a Software malfunction
A
software malfunction is an error, flaw, failure, or fault in a computer program
or system that causes it to produce an incorrect or unexpected result, or to
behave in unintended ways. Most bugs arise from mistakes and errors made by
people in either a program's source code or its design, or in frameworks and
operating systems used by such programs, and a few are caused by compilers
producing incorrect code. A program that contains a large number of
malfunctions, and/or malfunctions that seriously interfere with its
functionality, is said to be buggy. Reports detailing bugs in a program are
commonly known as bug reports, defect reports, fault reports, problem reports,
trouble reports, change requests, and so forth.
malfunctions
trigger errors that can in turn have a wide variety of ripple effects, with
varying levels of inconvenience to the user of the program. Some bugs have only
a subtle effect on the program's functionality, and may thus lie undetected for
a long time. More serious malfunctions may cause the program to crash or
freeze. Others qualify as security malfunctions and might for example enable a
malicious user to bypass access controls in order to obtain unauthorized
privileges.
- Human
error
·
Can be a Data entry errors
Transposition
errors are commonly mistaken for transcription errors, but they should not be
confused. As the name suggest, transposition errors occur when characters have
“transposed”—that is, they have switched places. Transposition errors are
almost always human in origin. The most common way for characters to be
transposed is when a user is touch typing at a speed that makes them input one
character, before the other. This may be caused by their brain being one step
ahead of their body.
·
Can be a error data deletion
Data
kerugian adalah kondisi kesalahan dalam sistem informasi di mana informasi
dihancurkan oleh kegagalan atau kelalaian dalam penyimpanan, transmisi, atau
pengolahan. Sistem informasi mengimplementasikan backup dan pemulihan bencana
peralatan dan proses untuk mencegah kehilangan data atau mengembalikan data
yang hilang.
- Disaster
The
natural disaster is a natural event that resulted in adverse impact on the
human population. Natural events could be a flood, volcanic eruptions,
earthquakes, tsunamis, landslides, snowstorms, drought, hail, heat waves,
hurricanes, tropical storms, typhoons, tornadoes, wildfires and disease
outbreaks. Some natural disasters do not occur naturally. Examples are
starving, the shortage of food in bulk is caused by a combination of human and
natural factors. Two types of natural disasters resulting from space rarely
affect humans, such as asteroids and sun storms.
ACTIVE THREAT
Active
Threat is a dark user equipment connected communication facility to alter or
modify the data transmission or bring gesture control gesture control data or
false.
Active
Threat is a dark user equipment connected communication facility to alter or
modify the data transmission or bring gesture control gesture control data or
false . For this category , there are three types , namely : message - stream
modification , denial of message service and masquerade . Type of message -
stream modification enables the offender to choose to delete , modify ,
suspend, did reorder and duplicate the original message . Performers also
possible to add fake messages . Type denial of message service allows the
perpetrators to destroy or put off most or all of the messages . Type
masquerade allows actors to masquerade as the original host or switch and
communicate with other hosts or switches to get the data or services .
Other
threats such as fraud and computer crime. This threat is based on a computer as
a tool to perform actions that are not true. The use of computer-based systems
can sometimes be prone to fraud (fraud) and theft.
The
method commonly used by people in penetrating the computer-based system there
are 6 kinds (Bonar and Hopwood, 1993), namely:
- Manipulating
input.
- Replacement
program.
- Direct
replacement.
- Data
theft.
- Sabotage.
- Misuse
and theft of computing resources.
In
many of the computer fraud, manipulation of input is the most widely used
method, since it can be done without requiring high technical skills.
Manipulation through regular programs carried out by the specialist technology
file directly informasi.Pengubahan generally performed by people who have
direct access to the database.
Data
theft is often committed by "insiders" for sale. One of the cases
occurred in the Encyclopedia Britannica Company (Bodnar and Hopwood, 1993). The
company sells its employees accused a customer list to a direct mail advertiser
for $ 3 million.
Sabotage
can be done in various ways. The general term to express the action entered
into a computer system without authorization, ie hacking. During the riots
rahun 1998, many Web sites of government agencies in Indonesia compromised by
crackers.
To
prevent these threats, citizens and megabagan matelik Subak is guarding the
water at night in turns according to the agreement to stay up sometimes when
keeping water, because of the successful implementation of the regulation
depends on the cropping pattern rotation water supplies are classified into
three categories namely, when inventory adequate water, when the water supply
is inadequate and when the water supply is inadequate. These periods are prone
to water theft. The final solution of all these problems are solved by
customary law / awig awig subak agreed manners. In addition, the threat could
also come from pests and plant diseases.
Tidak ada komentar:
Posting Komentar