This paper Telecommunications IP network characteristics of a hacker attack on the telecommunication IP network security threats, introduction of the IP telecom network hacking methods and preventive measures, discussed how to set up telecom IP network against hacker attacks, the security policy. 1 Introduction Telecommunications network from the original telephone exchange based voice services are full to the voice, data, multimedia and other integrated services platform for change. IP technology as the key to next-generation telecommunications network technology, the traditional telecommunications network, because of its closeness, security is not very prominent, but the agreement with IP-based next generation network must face the past, has begun only in the IP Internet until appears Network Security Problem. China Telecom IP network at the threat of many factors, hacking is one of the most important kind, in the Chinese telecom IP network there had been cases of hackers, such as the recent adoption of a corporate employee participation in a Mobile Company project was the system password, and then penetrated Mobile top-up a central database, stealing prepaid card code, to move the company a loss of 370 million yuan. Recent years, the hacker attacks on the telecommunications network has brought about great damage, hacker attacks with the continuous development of technology, network and system vulnerabilities continue to appear, hacker groups, change, social network dependent increase in the future more and more hacking tools hidden, destructive power will be more and more, attacks will become more complex and difficult to prevent. 2006 World Telecommunication Day The theme is: to make the world more secure network. According to China's Ministry of Information Industry is also the theme of a series of thematic activities, which can be seen telecom network security has become an important issue in development. In this paper, hacking tools and strategies to prevent simple analysis given. 2 hackers on the IP telecom network security threat analysis The "PRC Telecommunications Regulations" on the telecom network security, more harmful for the real computer viruses, hackers, etc., made provisions prohibited. Which in the 58th article of any organization or individual shall have four categories of harm network security and information security, telecommunications act, which is intentionally in the third category Make , Reproduce, spreading computer viruses or otherwise assault telecommunications networks telecommunications facilities. This mainly refers to other act now hacking. Hackers worldwide IP network intrusion Communicate Systems, interception of communications security information, they distort information, replace page, download or steal sensitive information, host and network attacks, sending mail bombs, or to networks. Hacker attack, if successful, a small network of services is paralyzed, big is not restored within a short time caused the paralysis of the entire network, causing huge losses. Hackers have been able to pose a threat to telecom IP network, mainly the following reasons: (1) technology: IP protocol for errors and omissions making network deficiencies, provided the conditions for the hackers. For example, IEEE 802.11b WEP vulnerabilities appear, there are as TCP / IP protocol the lack of appropriate security mechanisms, and IP networks were originally designed without considering basic security issues and so have made telecommunications networks are crippled. With the growing size of software systems, systems software, application software become more complex, telecommunication equipment manufacturers, integrators and operators of software center in the development and implementation process would inevitably give rise to various defects and vulnerabilities, hackers could exploit these vulnerabilities to attack the telecom IP network. (2) management: lack of complete and unified security policy, the lack of sound, practical management and technical specifications for hackers "advantage of the loopholes" facilitated. Many networks in the early construction, the direction of development tend to the convenience and practicality of the network, ignoring the critical network security for the future development conceals potential problems. Some places the lack of rational planning and design of secure network configuration, firewall configuration is also not tight, these are provided for the convenience of hacker attacks. (3) Human aspects: the lack of network security professionals, and the operation and maintenance staff security awareness, security level, there are very different, some hackers actually can pass as manager by calling the Question to the network password, these have become telecom IP network hacking tools, the operation and maintenance personnel to improve the safety level and safety awareness on the various operators is an urgent matter. 3 Telecom IP network hacking tools and preventive measures Results are in accordance with hacking tools can be divided into two categories: local attacks and remote attacks; according to the depth of invasion can be broadly divided into: surface attack, read access, write and implement non-radical visit Radical Write and implementation of access; in accordance with the system, the degree of attack can be divided into six levels: first level is the e-mail bomb attacks and denial of service attack, the second layer is a local user access to unauthorized read access, the third layer is the local user access to non- write access authorization, the fourth layer is the remote user access to non-authorized user accounts and remote access to files read access, the fifth layer is the remote user is licensed to write the file permissions, the sixth layer is the remote user access to root privileges. Several categories of relationship shown in Figure 1. Figure 1 hacking telecom IP network means the relationship between several categories Common hacker attacks, means of telecommunication IP network are: password cracking, etc. decoding type attacks, malicious code attacks, backdoor attacks, denial of service type attacks, mail bomb, bomb attacks on class mailing list, through IP attack packets, the telecommunications network through the operating system vulnerabilities to attack, buffer overflow and remote buffer overflow attacks, network service exploits and so on. Here are several common hacking tools for analysis. 3.1 decoding type attacks such as password cracking Password hacker attack is one of the most common attack methods. Hackers crack through password cracking software Server Account password, as administrators do safety awareness is not strong, which makes the method simple and effective. For password cracking attacks, set the password should be careful not to use too simple; not to use the different accounts the same password; should keep your password secure passwords and frequently changing laws; make all your passwords from time to time are replaced once; timely cancellation or stop work out of job I am an expert from chinaweldinggloves.com, while we provides the quality product, such as China Pig Leather Gloves , Ladies Cotton Gloves, Pig Leather Gloves,and more.
Related Articles -
China Pig Leather Gloves, Ladies Cotton Gloves,
|