Monday, April 11, 2011

Understanding Threat, Attack, Exploit, Crackers, Bandwidth, Digital Signature and Defaced


Threat
Threat is one of the three components that contribute to the Risk Management model, which used to face the threat (managing threats).

ATTACK
Denial of Service is to inhibit the activity of a service (the service) or off it, so that legitimate users / interested parties can not use the service. Denial of Service attacks (DOS) occurs when the attacker or who often heard the term hacker has dented sevice existing host or host or service so that it can no longer communicate fluently in its network neighborhood. The development of DOS attack is a DDOS. DDoS attack is a type of attack traffic by fulfilling the site's server until the site becomes slow and difficult to access. Another notion about DDOS is continuously sending data using a computer is not so effective because it is usually the server resources are being attacked more than a computer attackers.

From some sense it can be concluded that the DDOS attacks (Distribute Denial Of Service) is very detrimental to the attack, because the attacks could deter users from computer work korban.Dimana victim's computer becomes slow and difficult to access the full consequences of traffic in the computer.

Exploit
Exploit is a software (software) that attack the fragility of security (security vulnerability) are specific but not always aim to launch an unwanted action. Many computer security researchers use the exploit to demonstrate that a system has a vulnerability. There is a body of researchers who work with software manufacturers. The researcher was in charge of looking for the fragility of a software and if they find it, they report their findings to the manufacturer for a manufacturer to take action. However, exploits sometimes be part of a malware attack fragility in charge of security.

Crackers
Cracker is a term for those who go into someone else's system and crackers more destructive, usually dijaringan computer, bypassing passwords or licenses computer programs, computer security against deliberate, to defaced (damage to a web front page) belonged to someone else, even to men-delete the data of others, stealing data and generally do the cracking for their own benefit.
Cracker does not have the code of conduct or rules of the game, because the cracker destructive. Cracker has a site or our channel in IRC are hidden, the only people - certain people can access it. Cracker also has an IP that can not be traced. The case most often done by the cracker is Carding Credit Card Theft and burglary site and change everything in it becomes a mess.

BANDWIDTH
Bandwidth or bandwidth is broad or wide range of frequencies used by the signal in the transmission medium. Within this framework, the bandwidth can be defined as the difference between the high frequency signal components and low frequency signal. Signal frequency is measured in Hertz. Bandwidth is defined as well as the dosing frequency range. In the language easy, a measure of data traffic flowing in and out. In the world of hosting, we are given bandwidth allocation per month depending on how much we spend. End bandwidth is determined how many of us to upload or download. More and more uploading activities, plus more and more visitors are accessing, then the less a given bandwidth allocation.
Bandwidth computers in computer networks, often used as a synonym for data transfer rate is the amount of data that can be carried from one point to another within a specified period (usually within seconds). This type of bandwidth is measured in bps (bits per second). Sometimes also expressed in Bps (bytes per second). A modem that works at 57,600 bps has twice the bandwidth of a modem that works at 28,800 bps. In general, connections with large bandwidth / high enables the delivery of great information such as sending pictures or images in video presentation.

DIGITAL SIGNATURE
Digital signature is a cryptographic security system of symmetric (symmetric crypthography / secret key crypthography) that uses the same key in encryption and decryption of a message (message). Here the sender and receiver use the same key, so they must maintain the confidentiality of the key.
In the digital signature is a data / messages will be encrypted with a symmetric key that is created randomly (randomly generated symmetric key) which will then be encrypted using the public key of the recipient. The result of encryption is then known as the digital envelope that will be sent with the message / data has been encrypted.

DEFACED
Simple understanding of deface / defacing or cyber grafity general language is an activity that pollutes or scratch - scratch / stain and change the core of the contents page of a website with the word / phrase, picture / image, or a particular link that makes a link to deviate from the command we give or we make. Usually the purpose players (usually called a hacker) is so that he gets a name and to the attention of the crowd, be caused by isengnya conversation that could make him feel a little proud of having successfully infiltrated.
The target of hackers have in common is that web server running on Windows 2000 operating system and server is IIS 5.0 / 6.0.