25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

22.1 Security exposures <strong>and</strong> solutions<br />

This section gives an overview of some of the most common attacks on<br />

computer security, <strong>and</strong> it presents viable solutions to those exposures <strong>and</strong> lists<br />

actual implementations thereof.<br />

22.1.1 Common attacks against security<br />

For thous<strong>and</strong>s of years, people have been guarding the gates to where they<br />

store their treasures <strong>and</strong> assets. Failure to do so usually resulted in being<br />

robbed, victimized by society, or even killed. Though things are usually not as<br />

dramatic anymore, they can still become very bad. Modern day IT managers<br />

have realized that it is equally important to protect their communications<br />

networks against intruders <strong>and</strong> saboteurs from both inside <strong>and</strong> outside. One<br />

does not have to be overly paranoid to find some good reasons as to why this is<br />

the case:<br />

► Packet sniffing: To gain access to cleartext network data <strong>and</strong> passwords<br />

► Impersonation: To gain unauthorized access to data or to create unauthorized<br />

e-mails by impersonating an authorized entity<br />

► Denial-of-service: To render network resources non-functional<br />

► Replay of messages: To gain access to information <strong>and</strong> change it in transit<br />

► Password cracking: To gain access to information <strong>and</strong> services that would<br />

normally be denied (dictionary attack)<br />

► Guessing of keys: To gain access to encrypted data <strong>and</strong> passwords<br />

(brute-force attack)<br />

► Viruses: To destroy data<br />

► Port scanning: To discover potential available attack points<br />

Though these attacks are not exclusively specific to <strong>TCP</strong>/<strong>IP</strong> networks, they must<br />

be considered potential threats to anyone who is going to base their network on<br />

<strong>TCP</strong>/<strong>IP</strong>, which is the most prevalent protocol used. <strong>TCP</strong>/<strong>IP</strong> is an open protocol,<br />

<strong>and</strong> therefore, hackers find easy prey by exploiting vulnerabilities using the<br />

previous methods.<br />

22.1.2 Solutions to network security problems<br />

Network owners need to try to protect themselves with the same zealousness<br />

that intruders use to search for a way to get into the network. To that end, we<br />

provide some solutions to effectively defend a network from an attack,<br />

specifically against the attacks mentioned earlier. It has to be noted that any of<br />

772 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!