12.07.2015 Views

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Computer Networks and Security• network packet sniffers,• password attacks,• IP spoof<strong>in</strong>g,• middle man attacks,• denial-of-service attacks, and• application layer attacks.Packet SniffersNetworked computers communicate serially by send<strong>in</strong>g one datapiece after ano<strong>the</strong>r. The large data pieces are broken <strong>in</strong>to smaller pieces.The smaller pieces are <strong>the</strong> network packets.Some network applications distribute <strong>the</strong> network packets <strong>in</strong> cleartext. These packets are not encrypted and can be processed and read bya packet sniffer which can be implemented <strong>in</strong> ei<strong>the</strong>r software or hardware.The packet sniffer is normally used for network fault analysis. Itcan pick <strong>the</strong> packets off <strong>the</strong> network and process <strong>the</strong>m for data analysis.The packet sniffer software will capture <strong>the</strong> packets received on aphysical network wire. There are freeware and shareware packet sniffersthat allow any user to get <strong>in</strong>to a system without any knowledge of <strong>the</strong><strong>in</strong>ner work<strong>in</strong>gs of <strong>the</strong> system.In a networked database, a packet sniffer can be used to get <strong>in</strong>formationthat is queried from <strong>the</strong> database, along with user account namesand <strong>the</strong> passwords used. This can be a problem s<strong>in</strong>ce users often reuse<strong>the</strong>ir log-<strong>in</strong> names and passwords across multiple applications.O<strong>the</strong>r packet sniffer <strong>in</strong>formation <strong>in</strong>cludes <strong>the</strong> topology of <strong>the</strong> network,what computers run specific services, how many computers areon <strong>the</strong> network and which computers have access to o<strong>the</strong>rs.Password AttacksPassword attacks occur when <strong>the</strong>re are repeated attempts to identifya user account or password. These attacks take place from bruteforce, repeated attempts which are often automated. O<strong>the</strong>r attacks cancome from Trojan horse programs, IP spoof<strong>in</strong>g, and packet sniffers.Once an attacker ga<strong>in</strong>s access to <strong>the</strong> network, <strong>the</strong>y could modify<strong>the</strong> rout<strong>in</strong>g tables for <strong>the</strong> network. Then, all network packets can be©2001 by The Fairmont Press, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!