There are many necessary technical services required for operating an internet. The required services are routing, addressing, domain naming, and database management. Without these services, the internet is not possible. These services of the internet are also primary targets for cybercriminals.
Cybercriminals use a different technique to capture data stream over a network. These techniques put in dangers all sensitive data, like username, password and credit card information. These techniques included botnets, DDoS, hacking, malware, pharming, phishing, ransomware, spam, DNS Spoofing, and Man-in-the-Middle. Criminals used these techniques for monitoring and recording all information coming across a network. Following is the short explanation of the above technique.
Botnets are largely undetected because it is a collection of software robots, or ‘bots’, that creates a group of infected computers known as “zombies” that are remotely controlled by the originator of the robots. You may be one of them and you may not even know it
Distributed denial-of-service (DDoS)
A distributed denial-of-service attack or a DDoS attack is an attack when an infected user gets a network of zombie computers to sabotage a specific website or server. The attack occurs when the malicious user tells all the zombie computers to connect to a particular server or a website again and again. That increase the volume of traffic on that specific server or a website resulting overloading that slow the server and website for legitimate users, sometimes the website or server shuts down completely. By using a malicious user computer the attacker can take advantage of security vulnerabilities and weaknesses and could take control of your computer. The attacks are “distributed” because the attacker is using several computers to launch the denial-of-service attacks.
Hacking is an expression used to explain actions taken by someone to gain unauthorized access to a computer. This is a process by which cybercriminals gain access to any computer connected to the internet.
Pharming is a type of online fraud. It’s meant to point the user to a malicious and illegitimate website by redirecting the legitimate URL. Even if the address is entered correctly, it can still be redirected to a fake website.
Phishing is easy to execute and its required very little efforts therefore many cybercriminals use phishing. Criminals sent fake emails, text messages and created a website looking authentic. They use email, messages, and website to steal personal and financial information from users. This is also known as spoofing.
Ransomware restricts access to the users own computer and files. It is a type of malware that displays a message and demond payment to remove the restriction from computer and files. The email contains a malicious attachment and pop-up advertisement is the most common type of ransomware infection.
Spam is another common method of sending information out and collecting it from unsuspecting people. The spam distributes unsolicited messages, advertising or pornography to the addresses that are easily available on the Internet through like social sites, company websites and personal blogs.
This technique is often used in conjunction with phishing in an attempt to steal information. Domain Name Service (DNS) translates an IP address into name and Domain name into IP address, such as www.networkustad.com, into its numerical IP address and vice versa. If a DNS server does not know the IP address of the required domain, it will request another DNS server. Using DNS spoofing, the cybercriminal introduces fake data into a DNS resolver’s cache. These attacks develop a weakness in the software of the DNS system that causes the DNS servers to forward traffic for a particular domain to the criminal’s computer, instead of the valid owner of the domain.
They also use irregular devices, for example, unsecured Wi-Fi devices and access points. If the criminal installs unsecured Wi-Fi near a public place, unsuspecting individuals may sign in to these devices and the packet sniffer copies their personal information.
Packets forgery or packet injection interferes with an established network communication by constructing packets become visible just they are the part of a communication. It allows a criminal to interrupt or catch real packets. With this process, a criminal can hijack an authorized connection or denies an authorized person able to use assured network services. This is called a man-in-the-middle attack.
Innovators and visionaries are two types of experts in the cybersecurity. These experts build different cyber domains of the Internet. They have the capability to identify the power of data and bind it. They provide service for cybersecurity and build special organizations for these services. These organization also giving services to protect people from cyber […]
Thwarting the cyber criminals is not an easy task. But, company, government, and organizations have started to get the parallel action to limit and discourage cyber criminals. The actions against cybercriminals are included: Creating early warning system sensors and alert system. The system is too much costly therefore it is impossible to monitor each network. […]
The typical cybercriminals in the cyber world in the early days were youngsters or hobbyists. Their attacks generally limited to pranks and vandalism. But at present, the cybercriminals become very dangerous. The attackers are individuals or groups. They try to make use of the vulnerabilities for there mission. These criminals are interested in the whole […]
Different Cisco Catalyst switches support different numbers of VLANs. The number of supported VLANs is sufficient to accommodate the requirements of nearly all organizations. The Catalyst 2960 and 3560 Series switches support VLANs over 4,000. The Normal VLANs range is numbered from 1 to 1,005 and extended-range VLANs are numbered from 1,006 to 4,094. The […]
The Layer 2 devices use Ethernet frame header information to forward packets without having routing tables. Usually, Ethernet frame header does not contain any information about VLAN, so, when Ethernet frames arrive in a trunk, information about its VLAN must be added. This method called tagging. The standard for VLAN tagging is IEEE 802.1Q. The […]
Network without VLANs In the default configuration, when a switch receives a broadcast frame on the ingress ports of the switch it forwards the frame out all ports excluding the port where the broadcast frame was received. Because the whole network is configured in the same subnet and no VLANs are configured therefore all ports are […]
There are different types of VLANs used in networking. Some VLAN is defined by classes of traffic and some other are defined by the specific function that they serve. Each switch has a default VLAN. Default VLAN VLAN-1 is the default VLAN in Cisco switches. After initial boot up process, the switch loads the default […]
VLANs make it simple to plan a network to maintain the goals of an organization. The most important benefits of VLANs are as follows: Security Security in one of the primary benefits of VLANs. it makes possible that the hosts that have sensitive data are separated from the rest of the network. The separation decreases […]