This website uses cookies to ensure you have the best experience. Learn more

Packet Sniffing Prevention Essay

573 words - 3 pages

Packet Sniffing Prevention

Blocking a Wireless Sniffer-Public Connection

• Disable the automatic connection feature in wireless settings
• Configure a firewall that is automatically installed with Window updates. Enhance the strength of the firewall and increase security settings to “block all incoming connections”
• Confirm the public network’s home page includes a privacy policy. (Networks that use encryption to protect other users from accessing files on the computer will come complete with a privacy policy. Networks that don’t have a privacy statement on the home page do not use encryption.)
• Use sites with ‘https’ at the beginning of the URL instead of ‘http’. The ‘s’ = security

Tips to Defend against Sniffing

• Restrict the physical access to the network media to ensure that a packet sniffer is not able to be installed
• Use encryption to protect confidential information
...view middle of the document...

(each packet has a header is encrypted which contains the major information like addresses)
• PGP and MIME: Commonly used Email services. As emails are stored for extended periods, it is best to use them so emails don’t end up in wrong mailboxes.
• VPN (Virtual Private Network – provide encrypted data across the Internet. They are more secure, but if hacked the data may be seen even before encryption.

Anti-Sniffing Tools

• Scan networks to determine if any NICs are running a promiscuous mode
• Run tools regularly
• They act as an alarm triggered by evidence of a sniffer

Crime - Three International Hackers Indicted for “Sniffing”
Payment Card Numbers - 5/14/2008

• Hacked electronic cash registers of US restaurant Dave and Busters (D&B) between May and August of 2007
• Stole credit and debit card numbers
• Cost of New York store at least $600,000 and 5,000 credit/debit card numbers stolen
• Illegal accessed 11 national chain servers by installing packet sniffers at each location
• The sniffers “vacuumed up Track 2 data from credit card magstripes as it traveled from the restaurants servers to D&B’s headquarters in Dallas, TX.”
• Track 2 data comprises only the credit/debit card’s numbers, expiration date and security code.
• Names or other personally identifiable information like social security number or bank account numbers were revealed.
• Ken Pappas, security strategist at Top Layer Networks, states the breaches occur as retailers fail to encrypt the card data at the point of the swipe.
• Pappas stated companies don’t encrypt card number sent from cash registers until they reach a centralized location, headquarters. At headquarters they are encrypted and sent to third party for verification. Recommendation: invest in point of swipe encryption.

Sources
http://www.ehow.com/how_7354230_block-wireless -sniffer.html

http://luizfirmino.blogspot.com/2011/09/how-tdefen-against-sniffing.hmtl

http:// www.symantec.com/connect/articles/sniffers-what-they-are-and-how-protect-yourself

http://www.securitymanagement.com/news/three-international-hackers-indicted-sniffing-p…

Other Papers Like Packet Sniffing Prevention

Indp Final Essay

4433 words - 18 pages takes a given network packet to travel from source to destination and back (Mitchell, n.d.). A low latency defines a system that experiences short delay times and high latency defines systems that experience long delays. Systems suffering from high latency are said to be unreliable and slow therefore are inefficient. Response time: Refers to the time it takes to establish communication on a networked computer system. This is the time

Computer Tricks Essay

3238 words - 13 pages mechanisms of these organizations to the limit with the sole aim of exploiting them and profiting from the exercise. High-profile crimes have proven that the traditional approach to computer security is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms such as firewalls, intrusion detection, and prevention systems, strong end-to-end encryption standards, and anti-virus software. Hackers have proven

Principles Of Information Security

3291 words - 14 pages . The figure shows the use of firewalls and prevention IDPS that use both packet-level rules (shown as the header in the diagram) and content analysis (shown as 0100101011 in the diagram). More information on firewalls and intrusion detection systems is presented in Chapters 6 and 7, respectively. Security Perimeter A perimeter is boundary of an area. A security perimeter defines the boundary between the outer limit of an organization’s security

Principles of Information Security

3241 words - 13 pages implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers, and access controls. Figure 5-9 illustrates the concept of building controls in multiple, sometimes redundant layers. The figure shows the use of firewalls and prevention IDPS that use both packet-level rules (shown as the header in the diagram) and content analysis (shown as 0100101011 in the diagram). More information on firewalls and

Computer System Security

3291 words - 14 pages . The figure shows the use of firewalls and prevention IDPS that use both packet-level rules (shown as the header in the diagram) and content analysis (shown as 0100101011 in the diagram). More information on firewalls and intrusion detection systems is presented in Chapters 6 and 7, respectively. Security Perimeter A perimeter is boundary of an area. A security perimeter defines the boundary between the outer limit of an organization’s security

Evidence Collection

2876 words - 12 pages strongest perimeter, properly configured defense mechanisms such as firewalls, intrusion detection, and prevention systems, strong end-to-end encryption standards, and anti-virus software. Hackers have proven their dedication and ability to systematically penetrate networks all over the world. In some cases, black hats may be able to execute attacks so flawlessly that they can compromise a system, steal everything of value, and completely erase

Freedom And Responsibility

2141 words - 9 pages Built within the Constitution of the United States are specifically defined freedoms that are guaranteed to all citizens. Conversely, with every constitutional freedom there comes a corresponding responsibility. On September 25, 1789, the state legislature’s twelve proposed amendments were transmitted by congress, the first two dealing with congressional representation and congressional pay. The following numbers three through twelve were

Hate Crime Laws

2348 words - 10 pages On June 7, 1998, 49-year-old James Byrd Jr. of Texas accepted a ride from three white men, who then beat him severely, urinated on him, chained him by his ankles to the back of their pick-up truck, dragged him for three miles into the countryside, and dumped his corpse in front of an African-American cemetery (Graczyk). A little over a year later, a jury sentenced ring leader John King to death by lethal injection (“Man Executed for Dragging

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages Rational Emotional Behavior Therapy Case Study of Sarah: A Conceptualization and Treatment Plan Rational emotive behavior therapy, REBT, was developed by Albert Ellis and holds the central belief that the events in our lives do not cause our disturbances but that they are instead caused by our view of the events (Murdock, 2009). Murdock (2009) states that “people are seen as responsible for their behavior” (p. 279) but, because they are

Holidays In Albania

1636 words - 7 pages Have you ever thought about having exciting and incredibly cheap vacations? Albania might be the right choice. According to My Travel Guide, Albania is ranked the fourth among ten places worth visiting in Eastern Europe (“Top 10 Eastern European Destinations”). One can encounter three kinds of vacations in this Mediterranean country: winter, summer, and cultural. The ideal places to spend your winter vacations are the Albanian Alps. They are

A Heart Of Darkness

1748 words - 7 pages In this short story, there are frequent significant subject and ideas that make the story, "A Heart of Darkness," by Joseph Conrad, and haunting novel. The main theme is absolute white power over the natives. The theme validates the corruption, and the dependence caused by the white people as they took over the Congo. White men were giving all the power; they had no self-control, and in the end they did not use wisely. The white men became

Related Essays

Packet Sniffing Essay

3387 words - 14 pages ABSTRACT: Packet sniffing is a technique of monitoring every packet that crosses the network. A packet sniffer is a piece of software or hardware that monitors all network traffic. The security threat presented by sniffers is their ability to capture all incoming and outgoing traffic, including clear-text passwords and usernames or other sensitive material. While packet sniffers can be fully passive, some aren’t, therefore they can

Week 7 Project Paper

3453 words - 14 pages /articles/secure_my_business/what_is_network_security/index.html. Cert. Home Network Security. Retrieved from http://www.cert.org/historical/tech_tips/home_networks.cfm. Matt Curtain. InterHack. Kent Information Services. Introduction to Network Security. Retrieved from http://www.interhack.net/pubs/network-security/. Tom King. August 4, 2002. Packet Sniffing in a Switched Environment. Retrieved from http://www.sans.org/reading-room

Technical Paper

2818 words - 12 pages able to directly communicate with workstations on another VLAN. When properly configured, VLAN segmentation severely hinders access to system attack surfaces. It reduces packet-sniffing capabilities and increases threat agent effort. Finally, authorized users only “see” the servers and other devices necessary to perform their daily tasks CITATION Olz12 \l 1033 (Olzak, 2012). Another assumption made by this report is that the Oracle 9i Database

Issc340 Final Paper

3359 words - 14 pages is being requested from will encrypt the information from themselves to the requester. Instead of connecting to port 80, HTTPS connects to port 8080. The use of HTTPS helps protect against packet sniffing and other forms of eavesdropping. Although it is a very great way to help protect a network, it will not be effective if it is not properly implemented or if software is not up to date. Because the data is only encrypted to the client only