Attack technology: Network scanning, network monitoring, network intrusion, network backdoor, network stealth
Defense technology: Secure operating systems and operating system security configuration, encryption technology, firewall technology, intrusion detection, network security protocols.
Network scanning (Recommended learning: web front-end video tutorial)
Network scanning is a working program to confirm the host running on the network, or for Conduct attacks on hosts, or for network security assessments.
Network scanners, such as Ping sweeps and port scans, return information about which IP address mappings have hosts connected to the Internet and are working, and what services these hosts provide. Another scanning method is reverse mapping, which returns information about which IP addresses have no active hosts mapped to them, allowing the attacker to assume viable addresses.
Network monitoring
Network monitoring is a management tool for monitoring network status, data flow and information transmission on the network. It can set the network interface to monitoring mode , and can intercept information transmitted on the network. In other words, when a hacker logs in to a network host and obtains super user rights, if he wants to log in to other hosts, he can effectively intercept data on the network by using network monitoring. This is the best method for hackers. However, network monitoring can only be applied to hosts connected to the same network segment, and is usually used to obtain user passwords, etc.
Network backdoor
Backdoor programs generally refer to those program methods that bypass security controls and gain access to a program or system. During the development phase of software, programmers often create backdoors within the software so that flaws in the program design can be corrected. However, if these backdoors are known to others, or the backdoors are not removed before releasing the software, then it becomes a security risk and can be easily exploited by hackers as vulnerabilities.
Network Stealth: Use the firewall’s built-in intelligent detection rules to intercept the scanning and detection behaviors of hackers and viruses, making the computer invisible on the Internet
Encryption Technology
Encryption technology is the main security and confidentiality measure taken by e-commerce. It is the most commonly used security and confidentiality method. It uses technical means to turn important data into garbled (encrypted) transmission and reaches the destination. After reaching the destination, the data can be restored (decrypted) using the same or different means.
Firewall Technology
Firewall is a technical measure to protect computer network security. It isolates the inside and outside by establishing a corresponding network communication monitoring system at the network boundary. network to block network intrusions from the outside.
The above is the detailed content of What does cyber attack and defense include?. For more information, please follow other related articles on the PHP Chinese website!