In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article mainly introduces what is the most difficult to prevent network attack in the computer network, which has a certain reference value. Interested friends can refer to it. I hope you will gain a lot after reading this article. Let the editor take you to know it.
The most difficult cyber attack to guard against is eavesdropping. If encryption measures are not taken, all the contents of the communication can be fully grasped through protocol analysis, and the eavesdropping can also obtain information by infinite interception, and the original data signal can be recovered through the analysis of the electromagnetic signal so as to obtain the network information.
The operating environment of this tutorial: windows7 system, Dell G3 computer.
The most difficult cyber attack to guard against is eavesdropping.
In a passive attack, the attacker does not make any changes to the data information. Interception / eavesdropping means that the attacker obtains the information or related data without the consent and approval of the user.
Eavesdropping is the most commonly used means. The data transmission on the most widely used local area network is based on broadcast, which makes it possible for a host to receive all the information transmitted on the subnet. When the computer's network card works in miscellaneous collection mode, it can transmit all the information transmitted on the network to the upper layer for further analysis. If encryption measures are not taken, all the contents of the communication can be fully mastered through protocol analysis, and the eavesdropping can also obtain information by means of infinite interception. The electromagnetic wave radiated by the network station or the electromagnetic wave radiated by the network connecting equipment is received by a highly sensitive receiving device, and the original data signal is recovered through the analysis of the electromagnetic signal so as to obtain the network information. Although sometimes the data information can not be fully recovered by electromagnetic signals, valuable information may be obtained.
Because passive attacks do not make any changes to the attacked information, leaving traces are good, or do not leave traces at all, so it is very difficult to detect, so the focus of combating such attacks is to prevent, including virtual private network VPN, the use of encryption technology to protect information and the use of switched network equipment. Passive attacks are not easy to detect, so they are often the prelude to active attacks.
Although passive attacks are difficult to detect, measures can be taken to prevent them effectively, but it is very difficult to prevent attacks effectively, and the cost is too high. the main technical means to combat active attacks are detection and timely recovery from the damage caused by attacks. At the same time, detection also has a certain deterrent effect, which can also prevent attacks to a certain extent. Specific measures include automatic audit, intrusion detection and integrity recovery.
Thank you for reading this article carefully. I hope the article "what is the most difficult to prevent network attack in the computer network" shared by the editor will be helpful to everyone. At the same time, I also hope that you will support and pay attention to the industry information channel. More related knowledge is waiting for you to learn!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.