Asymmetric Encryption Encryption that uses two keys: if you encrypt with one you may decrypt with the other MD5 Message Digest 5. A hashing funciton used to provide integrity. MD5 uses 128 bits. A hash is simply a number created by applying the algorithm to a file or message at different times. The hashes are compared to each other to verify that integrity has been maintained. IPSec 1) Set of protocols developed to support the secure exchange of packets IPv4 and IPv6 2) Operates at a low level in the OSI model (Layer 3) 3) Transparent security protocol for applications, users, and software OSI Model 7.Application 6.Presentation 5.Session 4.Transport 3.Network 2.Data 1.Physical OSI Model Layer 3-Network Handles …show more content…
Dsniff is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc. Netstat Netstat shows IP-related statistics including: * Current connections * Incoming and outgoing connections * Active selections, ports, and sockets * The local routing table Netstat is used to view protocol connections that have been established by the system, as well as what incoming TCP/IP ports are in use by the system. Scareware / Adware Adware: software specifically designed to display ads in the form of popups or nag screens Scareware: malware designed to trick victims into purchasing and downloading useless and potentially dangerous software worm a type of virus that spreads itself, not only from file to file, but also from computer to computer. the primary difference between a virus and a worm is that a virus must attach to something. such as an executable file, in order to spread. worms do not need to attach to anything to spread and can tunnel themselves into computers. Virus Code that attaches itself to a program that is designed to cause malfunctioning of a computer or damage the data stored on the computer. bluejacking sending unsolicited messages to another device using Bluetooth to get the recipient to open
First, let’s talk about Wireshark, it is the most common network packet analyzer used worldwide, perhaps one of the best open source (free) packet analyzers today. It lets you capture and interactively browse the traffic running on a computer network, helping you analyze and manage the traffic in your network. Like a measuring device used to examine what is going on in your network cable, like a voltmeter used by an electrician to examine what is going on inside an electric cable. Therefore, gives you the tools to do in depth network analysis, it will try to capture network packets and display them as detailed as possible for analysis. Furthermore, used for troubleshooting network problems, examine security problems, debug protocol
TCP/IP is a protocol which transfers data across a network. It allows two different computers to communicate well even if they use different codes. Putting both computers into a new common code language which both computers
Malware refers to any computer program that is designed to do things that are harmful to or unwanted by a computer's legitimate user.
Wireshark is an open-source program which enables users to actively capture and interact with the network traffic which is being funnelled through the computer. Commonly, pieces of software which do this are referred to as ‘packet sniffers’ - As the program is recording the packets which pass through the network.
A virus is an infecting agent. Viruses are non-living they need a living host, a living organism to replicate themselves. When it invades a cell it will implant their code that is capable of copying itself. This will cause a detrimental effect, corrupting the system ti its advantage or complete destruction.
Network protocol communications, network connections established by host computer, network routing information, information about computers
Computer viruses have been around just about as long as the personal computer has existed. With the advent of the Internet, the ability of viruses to rapidly spread has increased substantially. Despite this increase in capability to infect large numbers of computers across international borders, the definition of a computer virus has not substantially changed over
Viruses and worms are malicious programs that self-replicate on computers or through computer systems without the user being cognizant. Worms are a series programs that repeat themselves from system to system minus the use of a host fie. Worms use methods to infiltrate remote computers and launch replicas of themselves like email messages or coping files to an accessible disk. A computer virus is a
A large group of submicroscopic infective agents. It is considered as nonliving extremely complex molecules, it contains a protein coat which is surrounding an RNA or DNA core of genetic material but no semipermeable membrane, virus is capable of growth and multiply itself but only in living cells, and they cause many diseases in humans, animals, and plants.
Malwares are mischievous programs crafted to agitate or forbid normal operations to gather selected information which may lead to loss of privacy through
Nmap: The standard of network scanning tools creates network packets to elicit responses. This tool tricks the target machine to revealing more information than a traditional ping (Northcutt, Shenk, Shackleford, Rosenberg, Siles & Mancini, 2006).
A good place to begin with any examination is with the statistical and metadata information that can be uncovered within the packet capture. Using Wireshark Protocol Hierarchy Statistics, we can see that the traffic consists mainly of DNS datagrams (figure 1).
Drive-by-Download: This is the involuntary download of software to a user’s computer prompted by visiting a Web site or viewing an HTML structured email and without the user’s permission and even without them noticing (Stallings & Brown, 2015).
A computer virus is Program or a portion of the codes that enter into the computer to target vandalism and characterized by their ability to copy itself to many copies and their ability to move from place to place and from computer to computer, disappearances and contents cover.