Monday, January 27, 2020

Types of Spoofing Attacks

Types of Spoofing Attacks 2.1 Distributed Denial of Service Attack The IP spoofing is mostly used in Distributed denial of service attacks (DDoS), in which hackers are concerned with consuming bandwidth and resources by flooding the target host machine with as many packets as possible in a short span of time. To effectively conducting the attack, hackers spoof source IP addresses to make tracing and stopping the DDoS as difficult as possible. Here the attacker scans internet and identifies the hosts with known vulnerabilities and compromise them to install attack program and then exploits the vulnerabilities to gain the root access. [6] 2.2 Non-blind spoofing This type of attack takes place when the hacker is on the same subnet as the target that can see sequence and acknowledgement of every packet. This type of spoofing is session hijacking and an attacker can bypass any authentication measures taken place to build the connection. This is achieved by corrupting the DataStream of an established connection, then re-establishing it based on correct sequence and acknowledgement numbers with the attack host machine. 2.2 Blind spoofing This type of attacks may take place from outside where sequence and acknowledgement numbers are not reachable. Hackers usually send several packets to the target host machine in order to sample sequence numbers, which is suitable in previous days. Now a days, almost every OSs implement random sequence number generation for the packets, making it difficult to predict the sequence number of packets accurately. If, however, the sequence number was compromised, information can be sent to the target host machine. 2.4 Man in the Middle Attack This attack is also known as connection oriented hijacking. In this attack mainly the attacker or the interrupter will attack the legal communication between two parties and eliminates or modifies the information shared between the two hosts without their knowledge. This is how the attacker will fool a target host and steal the data by forging the original hosts identity. In the TCP communication desynchronized state is given by connection oriented hijacking. Desynchronized connection is that when the packet sequence number varies for the received packet and the expected packet.TCP layer will decide whether to buffer the packet or discard it depending on the actual value of the received sequence number. Packets will be discarded or ignored when the two machines are desynchronized. Attacker may inject spoofed packets with the exact sequence numbers and change or insert messages to the communication. By staying on the communication path between two hosts attacker can modify or change p ackets. Creating the desynchronized state in the network is the key concept of this attack. [12] 2.5 Conclusion Various types of IP spoofing and its attacks are explained in this chapter. Here we have discussed about four types of spoofing attacks like Distributed Denial of Service Attack, Non-blind spoofing, blind spoofing and Man-in-the-middle attack, and also how these attacks can create problems to destination machines. Various Security requirements are discussed in the next chapter. Chapter 3: Security Requirements 3.1 Network security requirements The Internet became the largest public data network, enabling both personal and business communications worldwide. Day to day the data trafficking is increasing exponentially over the internet world and also in the corporate networks. As the technology is developing the speed of communication is increasing via e-mail; mobile workers, telecommuters. Internet is also used mainly to connect corporate networks to the branch offices. As the technolgy developed the usage of internet has became more and also usage of different technologies became more at the same time security threat also became more and gave chance to more faulties to do there things .so the corporations using them should protect and increase the security.The network attacks became very serious as they are more effective for the businesses because they store the important and sensitive data ,as the personal banking records or the business and medical reports. If the attack is done on such kind of corporates it is very difficult to recover the lost data which also leads to loose the privacy and takes lot of time to recover .The internet would also be the safest way to do the business Despite the costly risks .For example, It is not safe to give the credit card details to the telemarketer through the phone or even a waiter in the restaurent this is more risky than give the details in the web because security technology will protect electronic commer ce transactions. The telemarketers and waiters may not be that safer or trustworthy because we cannot monitor them all the time . The fear of security problems could be harmful to businesses as actual security voilates. Due to the distrust on the internet the fear and the suspicion of computers still exists.For the organisations that depends on the web will decrease there oppurtunities due to this distrust. To avoid this security polices should be strictly taken by the companies and also instate the safeguards that are effective.To protect their customers Organizations should adequately communicate . Companies should take the security steps to not only protect there customers from security breaches but also there employers and the partners information which are important for them. Internet ,intranet and extranet are used by the employers and the partners for the efficient and the fast communication.These communication and the efficiency should be looked after because they are more effectd by the network attacks. Attackers do the attack directly because this takes the lots of time for the employers to recover and restore the lost data and takes much time even in the network damage control. loss of time and valuble data could greatly impact employee effectiveness and confidence. The other main reason for the need of network security is the Legislation. according to the serveys conducted by the government they came to know about the importance of internet for the worlds economic status, they also recognize that the attackers effect on the internet could also cause the economic damag e to the world. National governments are mounting laws to regulate the vast stream of electronic information. Companies developed the strategies to secure the date in the safe way in accordance to put up the regulations given by government.The companies which does not take security polices to protect the data accordance will be voilated and penalized. 3.2 System security requirements In these days providing security had became a tough task for all the bisiness and the different organisations. Security must be provided to the customers and the important data to safeguard them from the malicious and involuntary leaks.Information is very important for every enterprise, it may be the custom records or intellectual property. By the CIOs it became possible to customers,employees and partners to get the data in fraction of seconds.The cost of money also became more to do all these things.There are three reasons for which this data may fall in risk they are (i) when the business process breaks down (ii) employee error (iii) gaps in security. Risk is then from customer and competitive pressures, regulatory and corporate compliance, and the rising cost publicity of data leaks Information one of the important resources of financial institutions. To keep the trust between the partners or develop the confidence in the customers it is more important to provide the good security which will be helpful for the good going and the reputation of the company . At the same time authentic information is necessary to process transactions and comfirm customer decisions. A financial institutions profit and capital can be affected if the information leaks to unauthorized companies. Information security is one of important process by which an organization protects and secures its systems, media, and maintain information important to its operations. The financial institutions have a great responsibilities to protect the nations financial service infrastucture On a broad standard. The financial security of the customer will also depends on th e security provided to the industry systems and its informations.effective security plans should be taken by the Individual financial institutions and their service providersfor their operational complexity .there should be a strong and effective board to maintain and take care of these security policies in order to protect the company from the security threats or any other malicious attacks.there should be a regular counseling to the organisations on the security precations they take to provide the companies , so that we can get the more effective results and can improve the organisations security level aswell. organizations often inaccurately recognize information security as condition of controls. As the Security is an ongoing process in overall security stance the condition of a financial institution depends on the indicator. Other indicators include the power of the institution to continually evaluate its stance and react suitably in the face of rapidly altering threats, techno logies, and business conditions. A financial institution establishes and maintains really effective information security when it continuously integrates processes, people, and technology to extenuate risk in accordance with risk assessment and acceptable risk tolerance levels. By instituting a security process financial institutions secure there risks they recognizes risks, forms a scheme to manage the risks, implements the scheme, tests the execution, and monitors the atmosphere to manage the risks. A financial institution outsources all of their information processing. Examiners use this booklet while evaluating the financial institutions risk management process, including the obligations, duties, and job of the service source for information security and the inadvertence exercised by the financial institution. [3] 3.3 Information security requirements An information security strategy is a plan to extenuate risks while abiding by with legal, Statutory, internally and contractual developed demands. Typical steps to building a strategy include the definition of control objectives, the assessment and identification of approaches to meet the objectives, the selection of controls, metrics, the establishment of benchmarks and the preparation of implementation and testing plans. The choice of controls is typically depends on cost comparison of different strategic approaches to minimize the risk .The cost comparison typically contrasts the costs of different approaches with the potential gains a financial institution could realize in terms of increased availability,confidentality or integrity of systems and data. These gains may include reduced financial losses, improved customer confidence, regulatory abidance and positive audit findings. Any particular approach should consider the following Policies, procedures and standards Technology design Resource dedication Testing and Training. For example, an institutions management may be assessing the right strategic approach to the security supervising of activities for an Internet environment. There are two potential approaches identified for evaluation. The first approach utilizes a combination of network and host sensors with a staffed supervising center. The second approach consists of every day access log examination. The first alternative is judged much more capable of detecting an attack in time to reduce any damage to the institution and its data, even though at a much more cost. The added cost is totally appropriate when institution processing capabilities and the customer data are exposed to an attack, such as in an Internet banking domain. The second approach may be suitable when the primary risk is reputational damage, such as when the Web site is not connected to other financial institution systems and if the only information is protected is an information-only Web site.

Sunday, January 19, 2020

Walmart Jit

According to Crosson and Needles the Just-In-Time (JIT) operating philosophy requires that â€Å"all resources—material, personnel, and facilities—be acquired and used only when they are need. Its objectives are to improve productivity and eliminate waste. † They go on to sate that this process allows funds to be reallocated according to the goals of the company’s business plan since they are no longer invested in inventory. This method helps retailers like Wal-Mart â€Å"assign more accurate costs to their products and identify the costs of waste and inefficient operation† (2011).And from the looks of things†¦Wally World knows what its doing. Wal-Mart utilizes JIT throughout their stores by having extremely flexible time slots for hourly employees and through contracting with whole sellers. This allows the company to move away from the ‘just in case’ strategy and meet demand as it occurs (Hubpages). This affects their vendors in t hat Wal-Mart will partner with wholesalers only in order to receive the lowest costs possible on goods. They will also be able to put in orders for items as needed without having to go through a ‘middle man’ in order to meet the demand of their consumers.It’s cut and dry. Like most things in business there always seems to be a very dark cloud inside a silver lining. Wal’Mart’s smart business decisions have lead to a monopolization of several local industries, seriously jeopardizing small businesses across the nation. There are labor issues and people across the country actively boycott the superstore†¦But at the end of the day, most American’s are cheerfully spoiled by the, everything, right now, and cheap mentality.And three days ago, I went into to Wal-Mart, picked up a prescription, bought a facial exfoliate, a baby shower gift, and some veggie burgers†¦. It’s a hard truth. Convenience wins out :-/ Crosson, S. V. , & Needl es, B. E. (2011). Managerial accounting. 9th Edition. Mason, Ohio: South-Western Cengage Learning. Hubpages. (2010). Why physical distribution is the key to Wal-Mart’s marketing strategy and lower prices. Retrieved from http://s10ecbiztalk. hubpages. com/hub/keytoWal-Martsmarketingstrategyandlowerprices

Saturday, January 11, 2020

Peer Pressure, A Silent Destroyer

When people make an assessment of a teaching institution, the usual statistics will show its population size, its average success rate relative to the next high school or next university, and matters relate d to funding and facility. It is due to this that a main problem which I believe has an actual direct effect on the teaching & learning capability institution is missed out on. This problem would mean great impact on the learning curve and capacity of the student to focus and maximize the facilities given by the institution no matter how good they may be.In common terms, we call it peer pressure. I believe in fact that it is because this is so common an experience that people may downplay its actual effect on a student or turn a blind eye to what it can do. In my own experience through earlier years I stood witness to this. It could be something as simple as people being pushed around in the hallway because their growth spurt was late and they were shorter than everyone else. Or, people being teased because their pants were too short or their clothes didn’t match.These issues seem childish and light, however considering the emotional makeup of a growing child or adolescent at this point, these can birth insecurities that scar one’s capacity to bloom later on. Are these incidents common? Absolutely. In fact, it is because they are common that they are missed out on. Schools will focus on building a new gym, or increasing the number of books to be read, or fine tuning the arithmetic and language curriculum. Now, don’t get me wrong. These things are very important in the quality of the individual. However, the school’s output is only one side of the coin.The other side lies in a student’s capability to absorb and focus on the lesson at hand. How can a young individual give his or her best output into utilizing these tools, if he knows that once he steps of the classroom, the bullies will be pushing him against the locker, or t he popular girls just might make fun of her again? Call it a seeming minor detail, but to a student in the growing year, â€Å"fitting in† and â€Å"belonging† can mean everything and certainly much more than a high grade. In my own school environment, my experience was the same. Friends of mine were subject to the similar treatment.It was hard to look at, but then, the feeling at the time was that there was nothing anyone could do about it. I can only imagine how much better they would have done in school if they didn’t have to worry about these things. I’ve seen these things happen in my own world with my own eyes. I’m sure others have as well. In the newspaper or nighttime updates, every now and then we hear stories about a new student killed by fraternity hazing, or a student with a gun in school. The common reaction would be to turn away and say, â€Å"oh that wouldn’t happen in my school.† Or â€Å"gosh, it so dangerous, but go od thing it’s not in the area of my kids†. Really, would that be the same mindset of the parents and students who actually were part of the school community where the event occurred? Looking at online forums on peer pressure, various responses of how the youth today is affected are expressed, particularly the girls. Heavy alcohol drinking, smoking, taking drugs and underage sexual activity are now very widespread in the youth whether or not we agree to believe it, simply because of this desire to be accepted.Conversations among them lie more on what the next person has done or not done, rather than on planning for the future. Many of them will be at parties getting drunk where it is played off as cool. Smoking and drug use are rampant as well. Even the pressure of having sex has grown over years, despite the media’s exposed risk of unwanted pregnancies or STD’s. Friends say it is â€Å"no big deal† and talk about it as if it was just sipping a cup o f tea, and a requirement to be â€Å"normal†. So many of these issues circle the mind of a student, remain unaddressed, and cloud the student’s mind from focusing on what should be the priority at the time.It is true that school facilities are important, however equally needed, is helping the students of today actually focus on using the school to create more of a future for themselves. The question remains though on how this problem can be addressed. True, it will not be an easy task, but if at all an attempt can be made to give students guidance and support during these hears of change, then at least some of them can be given the motivation to go against the grain and not succumb to the whims of peer pressure.Friends are diaries to which we can share and unburden all of our secrets and emotions into. They can be wise and a strong pillar of strength, while at the same time can be sources of wrong influence. If a school can create a positive working environment and enc ourage right experiences and friendships, this would be a tool to help. Family is another factor. For some who have good relationships with family, allowing interaction with them can provide the child to open up and reach out.For those whose families become unbearable, then it basically remains in letting the student have someone to talk to, chat with and trust, and ensuring such person is one who is understanding and capable of meeting the child at his level, whether it be a counselor, coach or friend. The problem does not lie on morals or lessons as these which are instilled in us in earlier youth remain there. The problem is that these very principles that we have prided ourselves in and held on to no longer empower us, as they are overshadowed by the need to ‘fit in’.And as this need grows, then our mind is pushed away from focusing on what matter at the time, namely, studies and improvement of one’s skills for the future. I am thankful that somehow I made it through those years and continually make the effort to grow. My only hope is that children of the future can be given more support, that they may surpass these obstacles with more grace than many of my friends did, and focus earlier on working on their goals and dreams for their future.

Thursday, January 2, 2020

Cell Phone Use While Driving - 990 Words

Cell phones are integral to people’s lives in Canada because they are vital communication and entertainment tools. However, the use of cell phones has remained contentious, because texting and talking on the phone are associated with distracted driving. Distracted driving is, â€Å"defined as the diversion of attention away from activities critical for safe driving toward a competing activity† (Klauer, Guo, Simons-Morton, Ouimet, Lee Dingus, 2013, p. 55). Although distracted driving is also associated with other activities such as drinking coffee and eating, radio operation and interactions with passengers, cell phone use has received the highest level of interest (Klauer, et al., 2013). A study conducted in 2015 stated about 60% of drivers send texts while driving, while 66% of drivers answer calls in the course of driving (Cheng, 2015). These statistics have contributed to the ongoing discussion on banning cell phone use while driving. When the use of cell phones whi le driving is banned the number of accidents and deaths on Canadian roads would reduce, some of the losses and financial burden associated with accidents would be reduced or eliminated, allowing the quality of life of those who are involved would be improved. Cell phones are not the only distraction culprit when driving. People participate in distractions of drinking coffee, turning on the radio and smoking while driving on a daily bases. In recent years provinces such as Alberta have also banned suchShow MoreRelatedUse Of Cell Phones While Driving860 Words   |  4 PagesAmericans rely heavily on cell phones to perform daily activities. Cell phone are used for phone calls, email, sending text messages, surfing the internet, and performing other tasks. It is unfortunate that many of these daily activities occur while a person is driving. As a result, an increase of accidents and fatalities have occurred because of the use of cellular phones while driving. Using a cell phone while driving is an epidemic that has taken our nation by storm. Most drivers believe theyRead MoreCell Phone Use While Driving1503 Words   |  7 Pagesforth over the lines or driving at very inconsistent speeds. You wonder what could possibly be causing the driver to drive so erratically. Is the driver drunk? Is the driver preoccupied with eating his or her lunch? Is the driver busy attending children in the backseat? Once you pull along the side you realize that was not the case, instead you notice the driver has a cellular telephone up to her or his ear chatting away, or even worse you pass and see the driver holding a phone texting, you pass byRead MoreThe Use Of Cell Phones While Driving1817 Words   |  8 Pagesknowledge that the use of cell phones while driving decreases driver awareness and overall road safety, and in response to this knowledge, some states have passed laws that have prohibited the use of handheld devices. However, there are no laws bann ing hands free cell phone usage, despite research claiming hands free devices are just as dangerous handheld devices. But, does their usage distract drivers enough to the point where states should legally ban the total use cell phones while driving? The followingRead MoreUse of Cell Phones While Driving824 Words   |  4 PagesIf you are driving at 55mph for 5 seconds in that amount of time you could cross a football field. People don’t understand how dangerous distracted driving really is. All states should have some sort of legal parameters of what happens when you get caught using your cell phone while driving. People should get a stronger/ harsher punishment for the use of a cellular device while driving. People are way more impaired when you are distracted and driving than you are drinking and driving. The problemRead MoreCell Phone Use While Driving1114 Words   |  5 PagesToday, we use our cell phones for just about anything and everything to include; texting, talking to our loved ones, and connecting with the rest of the world via social media. Cell phones have become a natural way of life to where we pick up our phones and use them like second nature. However, the dangers present themselves when we get behind the wheel of a car and carry these habits of cell phone addictions with us. If all states ban the use of cell phones while driving, then there would be a reducedRead MoreThe Use Of Cell Phones While Driving1843 Words   |  8 Pagesknown that the use of cell phones while driving decreases driver awareness and overall road safety, and in response to this knowledge, some states have passed laws that have prohibited the use of handheld devices. However, there are no laws banning hands free cell phone usage, despite research claiming hands free devices are just as dangerous handheld devices, but does their usage distract drivers enough to the point where states should legally ban the total use cell phones while driving? The followingRead MoreThe Use Of Cell Phones While Driving1509 Words   |  7 PagesSeveral states have enacted laws banning the use of cell phones while driving; an indication of the type of society America has become. These laws were put in place not only to keep drivers from taking phone calls, but also to deter them from posting their latest tweet or commenting on their friend’s latest picture. Social media is so ingrained in society today that many are unable to entertain a world that is devoid of such technology. With usage at an all-time high, the psychological effects ofRead MoreCell Phone Use While Driving Essay1816 Words   |  8 PagesThe study was attempting to determine the thoughts and behaviors that African American freshman college students in regards to cellphone use while driving. They wanted to know how the students thought cellphones (independent variable) impact driving skills (dependent variable). Research suggests that cellphone use correlates to higher likelihood of accidents. The study used 331 (195 females and 136 males) freshman students who held a driver’s license. The students were then given a questionnaireRead More Cell Phones And Driving: Dangers Involved with Cell Phone Use While Driving1036 Words   |  5 Pagesoften. Talking on the cell phone and driving has become a very popular thing these days. Technology is coming out with the newest phones that can do everything for you and people are attracted to that. There are people that don’t have hands free and drive their car with only one hand, people that text and totally take their eye off the road and type conversations to each other. Bluetooth is another technological breakthrough where you wear an ear piece and can receive phone calls by one touch ofRead MoreStop the Use of Cell Phones While Driving854 Words   |  4 Pages13 2013 Many people driving don’t know that they can be so many wrongs they can be doing without realizing it. Plenty talk on the phone while driving, drink, text and drive. A lot of people even innocent people as well have had accidents involving one of those. Out of the three there has been one that has become more common, and it’s only increasing if people don’t put a stop to it themselves. A usage of a cell phone should not be displayed at any point while driving. It can wait many have had