Attacks on business networks and hacking in general are consistent topics in today’s news. There are also many different types of infrastructure attacks—for example, malware, insertion, and buffer overflow. Please respond to the following for this discussion:
- Introduce yourself to your classmates by sharing something unique about your background. Explain how you expect this course will help you move forward in your current or future career.
- Examine the various types of attacks.
- Select the two that you consider to be the most successful and explain why.
- Explain how you can prevent many of these attacks and better protect your infrastructure.
After reading a few of your classmate’s postings, reply to those from which you learned something new or to which you have something constructive to add. For example:
- Discuss what you learned.
- Ask probing questions or seek clarification.
- Explain why you agree or disagree with your classmate’s main points, assertions, assumptions, or conclusions.
- Suggest research strategies or specific resources on the topic.
Be sure to respond to at least one of your classmates’ postings. Join the discussion early and post often.
Post from Jennifer that you have to reply
Before I begin, this is Jennifer Fraser and reside in Stafford, VA. I have worked with contractors with the Dept of Defense for five years as QA Analyst II and automation with selenium. Just laid off from the job two months ago. I am waiting to hear another job that I have applied IT, teacher, at Louisiana School for the Deaf in Baton Rouge. I will be moving in few weeks. I do have a master’s in Education and two certifications Linux Administration and Security +. My goal is to get Ph.D. again to have Deaf Education or Special Education for IT. Also, will continue working on CASP+ and Linux Engineering Certifications. Besides IT, I do work out in Kickboxing and swimming and have a deaf cat. I have one granddaughter and the other is on the way.
Examine the various types of attacks
Select the two that you consider to be the most successful and explain why
SQL Injection is the most common to break in the database. If anyone knows how to use SQL or takes classes or from YouTube. If anyone uses HTTP without SSL security will be able to hack with SQL injection. They can search with ID such as:
string query = “SELECT * FROM accounts WHERE custID = ‘” + request.getParameter(“id”) + “‘”;
This query can be exploited by calling up the web page executing it with the following URL:http://example.com/app/accountView?id=’ or ‘1’=’1causing the return of all the rows stored on the database table.
Most of the time this will be successful to keep the hackers out of the web application which they use HTTPS and API.
is broken authentication which is the password cracked or Brute Force. They will know something wrong when someone broke into your application. You may either have weak passwords or keeping passwords too long or no expirations. They will change passwords immediately. The most common is on Facebook. I have seen a lot. The hackers use the application to run Facebook from Linux. They use John the Ripper or other password cracked.
Explain how you can prevent many of these attacks and better protect your infrastructure
There are many ways to prevent any attacks. As for SQL injections which I have explained, this will help to prevent from having hacked into the system. This can filter the input properly and whether an input can be trusted. The system with 1,000 inputs, for example, to have filtering 999 of them is not sufficient which leaves one file that can serve to bring down your system. Putting SQL query result into another query is a good idea as the database needs to be trusted, if not then the input comes indirectly with malintent. Also, for broken authentication, they need to have additional authentication and authorization and stronger passwords as well. The best to keep a habit to change your passwords every three to five months. Sometimes the hackers can get in one way or other. It’s not easy to hack. A lot of them have tried. They keep trying every day. One 12-year-old kid from France knows how to hack but he is in jail. Unfortunately.
I want something to share with you this website below Hack Explaining. This is a very good program to understand how the hackers did. I find this very surprising how they did it. Amazing work. Help you understand better those attacks.