Essay Title: 

Computer and Network Infrastructure Attacks

March 24, 2016 | Author: | Posted in modern technologies, technology

Computer and Network Infrastructure Attacks

P2P / Wireless Networking / Mobile Networks


P2P and Wireless networking are two of the most fast emerging technological trends in Computer and Networking infrastructure . Despite the positive aspects of P2P -sharing it is a wrong notion prevailing among users that P2P threat comes only from the various freeware shareware and other MP3 accessible allied softwares . The impact of their negative intentions is very threatening indeed and is the subject matter of this

Also according to estimates by industry analysts it is predicted that wireless [banner_entry_middle]

LAN equipment will grow continuously higher to 5 .9 billion in 2006 . However the related unnerving fact reported by findings also indicates that 80 of these enterprise wireless LAN networks will remain susceptible to intrusion . Hence it has been strongly recommended to discover rogue access points , foreign devices connected to corporate access points and accidental tagging on to nearby company access points which compromise network security

The upward growth in mobile laptops (an estimated 86 of US employees will work on laptops by the year 2007 according to Gartner reports ) usage beckon a new set of set of problems and complexities for enterprises trying to simplify and offer seamless connections to their end users while simultaneously endangering their assets and business reputation at stake on the mobile network . The need for protecting the mobile workforce has become increasingly paramount


of the Attack

Most newer versions of P2P software automatically attempt to create a session on different communication ports . Thus they dynamically adapt to the blocking mechanisms incorporated in the corporate networks where ISP and other corporate traffic should also be allowed through the existing set of ports only . The threat proliferates beyond email to applications such as instant messaging , P2P and sharing

Impact of the Attack

Due to P2P activity your workstations and s can actually be communicating with unauthorized users and exchanging s . It is a widely known fact that some of the most dangerous worms like Swen Lirva , Fizzen worm are resultant of propagation through P2P programs The worst part of the P2P is that the infiltration is hard to detect or completely remove as footprints are left in the registry databases and configuration s . Ironically more damage is caused by the above worm infested malwares when their uninstall program is run

Detecting / Solving P2P Attacks

Even if one ‘s budget only allows for a single solution to the above teething problem go for protecting the desktop . One should seriously consider blocking P2P ports on the network . P2P software such as Kazaa Morpheus , BearShare and others can port scan , tunnel and even camouflage as HTTP traffic over port 80 . One could also implement packet-filtering firewalls such as ipchains (or iptables ) in Linux , Microsoft ISA Server for Windows 2000 and Windows 2003 or the free Cisco NBAR

Wireless Networking

of the Attack

A rogue wireless device is any unauthorized wireless device connected to an authorized enterprise network or device . Posing one of the greatest risks… [banner_entry_footer]

Comments Off on Computer and Network Infrastructure Attacks


This author has published 9190 articles so far. More info about the author is coming soon.

Comments are closed.