Hacking Wireless Networks
A Wireless LAN (WLAN) is an interconnection of computers over a local area network that exchanges data and other information without the use of cables. As more and more firms adopt wireless networks, the security issue becomes more crucial. Business is at high risk from whackers (wireless hackers) who do not need physical entry into the business network to hack, but can compromise a network with the help of freely available tools.
Physical security includes the measures to protect personnel, critical assets, and systems against deliberate attacks and accidents. It intends to prevent the unauthorized access of information and other assets of a company. Physical security does not just cater to securing systems only, but it also involves securing the entire premises, boundaries, workstations, and any other area that may be unique to a company. It provides an added layer of security for networks, by restricting the access of the network resources.
Evading IDS, Firewall and Honeypots
The Intrusion Detection Systems (IDS) and firewalls, honeypots serve various purposes in securing the organization from Internet threats. While the IDS detects any attempts made by an attacker to break into a system, the firewall only allows the authorized users to utilize the network resources and the honeypots are helpful in studying the mode of attacks the attackers use. The attacker will have to somehow come around these security features to remain undetected and not leave any tracks of the attack.
Cryptography is defined as a method of transmitting and storing the information such that only the intended individuals can read and process the data. The sensitive information is protected by encrypting the information. The cryptographic attacks circumvent the security of a cryptographic system by finding a weakness in a code, cipher, and cryptographic protocol in the encryption.
This module familiarizes you with cryptography and the different techniques used in cryptography. It explains about the types of cryptosystems and the types of cryptographic algorithms. It discusses about the private and public key cryptography. It explains about the different RSA attacks, Hash Functions, and Encryption. It also briefs about digital signatures and the attacks on digital signatures and explains the attacks on cryptography and the tools used in cryptography.