| Year | 2009 50 Downloads |
| Volume/Issue/Review Month | Vol. - 2 | Issue 1 | January – June |
| Title | Secure your Data by Breaking into IT! |
| Authors | Sumanjit Das |
| Broad area | Secure your Data by Breaking into IT! |
| Abstract | In this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, and show _why_ it is one. We will illustrate that even seemingly harmless network services can become valuable tools in the search for weak points of a system, even when these services are operating exactly as they are intended to. In an effort to shed some light on how more advanced intrusions occur, this paper outlines various mechanisms that crackers have actually used to obtain access to systems and, in addition, some techniques we either suspect intruders of using, or that we have used ourselves in tests or in friendly/authorized environments. My motivation for writing this paper is that system administrators are often unaware of the dangers presented by anything beyond the most trivial attacks. |
| DOI | Every day, all over the world, computer networks and hosts are being broken into. The level of sophistication of these attacks varies widely; while it is generally believed that most break-ins succeed due to weak passwords, there are still a large number |
| File | |
| Referenceses | 1 Das Sumitra, UNIX, New delhi, Tata McGraw- Hill, 2005 2 Forouzon Behrouz A, fegon S.C., data communication & networking, Tata Mc Graw- Hill, 2005 3 Fleeger P.P. , Pfleeger, security in computing, 20006 4 Corner Douglas E., internetworking with TCP/IP principle, protocol and architecture, PHI, 2004 5 Troudet T.P., Walters S.M., Newral Network Architecture, 1991 6 Barrel A., Nelson B.J., “implementing remote procedure call”, transaction on computer system, vol-2, pp. 39-59. 7 Chalasomi sandeep, trippireddy suresh, period of the d- sequence based random number generator www.arxiv.org 8 Hilker Michael, Schommer christoph, service oriented architecture in N/W security – a novel organization in security systems. http://arxiv.org/find/grp_csl/1/ and t ti: :+security/01/0/2008/0/1 |