12.07.2015 Views

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Computer Networks and Securitywork with undesired network packets is one technique that is used.Ano<strong>the</strong>r technique is to leave false <strong>in</strong>formation about <strong>the</strong> status of networkresources.Application and Trojan Horse AttacksApplication attacks use some weakness <strong>in</strong> <strong>the</strong> software that isfound on servers, <strong>in</strong>clud<strong>in</strong>g FTP. This allows <strong>the</strong> attacker to ga<strong>in</strong> accesswith <strong>the</strong> permission of <strong>the</strong> account runn<strong>in</strong>g <strong>the</strong> application.Trojan horse program attacks use a program that <strong>the</strong> attacker substitutesfor ano<strong>the</strong>r program. The substitute program can furnish <strong>the</strong>functions of <strong>the</strong> normal program. But, it also may monitor log-<strong>in</strong> attemptsand seize user account and password <strong>in</strong>formation.One type of Trojan horse program displays a screen, banner, orprompt that looks like a valid log-<strong>in</strong> sequence. The program processes<strong>the</strong> <strong>in</strong>formation that <strong>the</strong> user types <strong>in</strong> and e-mails it to <strong>the</strong> attacker.Secur<strong>in</strong>g <strong>the</strong> NetworkNetwork security can <strong>in</strong>clude firewalls, proxy servers and dataencryption. Proxy servers and firewalls act as traffic cops. They regulatewho gets <strong>in</strong> and out of <strong>the</strong> network.A firewall monitors <strong>the</strong> traffic cross<strong>in</strong>g network perimeters andsets restrictions accord<strong>in</strong>g to <strong>the</strong> security policy. Perimeter routers canalso be used. These can be located at a network boundary. Firewallscommonly separate <strong>in</strong>ternal and external networks. The firewall serveracts as <strong>the</strong> gateway for all communications between trusted networksand untrusted and unknown networks.The least secure network is <strong>the</strong> outermost perimeter network of <strong>the</strong>system (Figure 7-6). This area of <strong>the</strong> network is <strong>the</strong> easiest area to ga<strong>in</strong>access to, mak<strong>in</strong>g it <strong>the</strong> most frequently attacked.PasswordsThe shorter <strong>the</strong> password, <strong>the</strong> easier it is to guess and test. Passwordsshould be at least eight characters long. The maximum number of©2001 by The Fairmont Press, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!